A Model Based Security Testing Method for Protocol Implementation

The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an...

Full description

Saved in:
Bibliographic Details
Main Authors: Yu Long Fu, Xiao Long Xin
Format: Article
Language:English
Published: Wiley 2014-01-01
Series:The Scientific World Journal
Online Access:http://dx.doi.org/10.1155/2014/632154
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.
ISSN:2356-6140
1537-744X