共查询到20条相似文献,搜索用时 566 毫秒
1.
文章基于一种模块化的安全协议设计方法,定义了基本消息和基件的概念后,从研究安全协议的基件开始,将不同的基件适当复合后可得到具有特殊安全属性的组件,并运用BAN类逻辑对这些组件进行了形式化的分析。这些具有特殊安全属性的组件,在满足协议需求的同时,从底层开始保证了协议能够达到预期的安全目标,为安全协议的设计奠定了基础。 相似文献
2.
认证协议是网络环境中一类重要的安全协议,对协议进行形式化分析是保障其安全性的主要手段。文章以BAN逻辑为工具.分析了网络中常用的Kerbems认证协议。结果表明。Kerbems协议达到了预期的认证目标。 相似文献
3.
4.
5.
6.
7.
假冒和窃听攻击是无线通信面临的主要威胁。在个人通信系统中,为了对无线链路提供安全保护,必须对链路上所传送的数据/话音进行加密,而且在用户与服务网络之间必须进行相互认证。近年来,人们在不同的移动通信网络(如GSM,IS-41,CDPD,Wireless LAN等)中提出了许多安全协议。然而,这些协议在个人通信环境中应用时存在不同的弱点。本文基于个人通信系统的双钥保密与认证模型,设计了用户位置登记认证协议;并采用BAN认证逻辑对协议的安全性进行了形式化证明,也对协议的计算复杂性进行了定性分析。分析表明,所提出的协议与现有的协议相比具有许多新的安全特性。 相似文献
8.
假冒和窃听攻击是无线通信面临的主要威胁,在个人通信系统中,为了对无线链路提供安全保护,必须对链路上所传送的数据/话音进行加密,而且在用户与服务网络之间必须进行相互认证,近年来,人们在不同的移动通信网络(如GSM,IS-41,CDPD,WirelessLAN等)中提出许多安全协议,然而,为些协议个人通信环境中应用时存在不同的弱点,本文基于个人通信系统的双相钥保密与认证模型,设计了用户位置登记认证协议 相似文献
9.
10.
11.
Che-Hua Shih Juinn-Dar Huang Jing-Yang Jou 《Very Large Scale Integration (VLSI) Systems, IEEE Transactions on》2009,17(5):723-727
Verifying if an integrated component is compliant with certain interface protocol is a vital issue in component-based system-on-a-chip (SoC) designs. For simulation-based verification, generating massive constrained simulation stimuli is becoming crucial to achieve a high verification quality. To further improve the quality, stimulus biasing techniques are often used to guide the simulation to hit design corners. In this paper, we model the interface protocol with the non-deterministic extended finite-state machine (NEFSM), and then propose an automatic stimulus generation approach based on it. This approach is capable of providing numerous biasing strategies. Experiment results demonstrate the high controllability and efficiency of our stimulus generation scheme. 相似文献
12.
协议状态机逆构技术是分析未知协议行为逻辑的基本方法,是网络安全、信息对抗领域的一个重要研究方向。针对截获的未知二进制协议的通信数据,提出了一种二进制协议状态机逆向方法,该方法能够根据通信数据逆构协议状态转移图。在该方法中,设计了针对通信数据帧的基于多序列比对的对应字段对齐算法以及基于字段统计量分析的协议状态相关字段提取算法,并根据提取出的协议状态相关字段构建状态转换模型。在地址解析协议( ARP)和传输控制协议( TCP)上的实验结果表明该方法能够有效逆构出协议的状态转换模型。 相似文献
13.
并行组合扩频通信的数据调制映射法和安全通信协议方式* 总被引:5,自引:0,他引:5
并行组合扩频通信是一种高效率的新型扩频通信方式.本文提出了并行组合扩频通信的数据调制映射法,并以此为基础,给出了一种安全通信协议方式,既可作身份认证又有好的保密能力。 相似文献
14.
In this paper, a data-mining approach is used to develop a model for optimizing the efficiency of an electric-utility boiler subject to operating constraints. Selection of process variables to optimize combustion efficiency is discussed. The selected variables are critical for control of combustion efficiency of a coal-fired boiler in the presence of operating constraints. Two schemes of generating control settings and updating control variables are evaluated. One scheme is based on the controllable and noncontrollable variables. The second one incorporates response variables into the clustering process. The process control scheme based on the response variables produces the smallest variance of the target variable due to reduced coupling among the process variables. An industrial case study and its implementation illustrate the control approach developed in this paper 相似文献
15.
16.
A method for generating test sequences for checking the conformance of a protocol implementation to its specification is described. A rural Chinese postman tour problem algorithm is used to determine a minimum-cost tour of the transition graph of a finite-state machine. It is shown that, when the unique input/output sequence (UIO) is used in place of the more cumbersome distinguishing sequence, both the controllability and observability problems of the protocol testing problem are addressed, providing an efficient method for computing a test sequence for protocol conformance testing 相似文献
17.
提出一种密码学可靠的Zhou-Gollmann不可否认协议辅助验证方法。首先建立了计算模型下协议的执行语义模型,构造了一种基于密码学算法的证据伪造攻击。其次,指出目前对协议公平性建模方面的缺陷,并结合辅助工具证明:在加密算法满足选择明文攻击下的不可区分性和明文完整性,且数字签名算法满足选择消息攻击的不可伪造性的条件下,Zhou-Gollmann协议具有公平性和不可否认性。与现有方法相比,既能有效利用辅助工具的自动验证能力,又能弥补其验证能力的不足,提高了验证效率和验证结果的可靠性。 相似文献
18.
In this paper, the traditional random walk approach for yield optimization is modified to further improve its efficiency. The orthogonal array of experiment design is employed as an alternative to generating sample points in the circuit parameter space. In addition, the step of the random walk is modified to be adapt. Finally, an example is given to show its high efficiency. 相似文献
19.
僵尸网络是当前互联网上存在的一类严重安全威胁。传统的被动监控方法需要经过证据积累、检测和反应的过程,只能在实际恶意活动发生之后发现僵尸网络的存在。提出了基于僵尸网络控制端通信协议指纹的分布式主动探测方法,通过逆向分析僵尸网络的控制端和被控端样本,提取僵尸网络通信协议,并从控制端回复信息中抽取通信协议交互指纹,最后基于通信协议指纹对网络上的主机进行主动探测。基于该方法,设计并实现了ActiveSpear主动探测系统,该系统采用分布式架构,扫描所使用的IP动态变化,支持对多种通信协议的僵尸网络控制端的并行扫描。在实验环境中对系统的功能性验证证明了方法的有效性,实际环境中对系统扫描效率的评估说明系统能够在可接受的时间内完成对网段的大规模扫描。 相似文献
20.
Stephan Eggersglüß Görschwin Fey Andreas Glowatz Friedrich Hapke Juergen Schloeffel Rolf Drechsler 《Journal of Electronic Testing》2010,26(3):307-322
As technology scales down into the nanometer era, delay testing of modern chips has become more and more important. Tests
for the path delay fault model are widely used to detect small delay defects and to verify the correct temporal behavior of
a circuit. In this article, MONSOON, an efficient SAT-based approach for generating non-robust and robust test patterns for
path delay faults is presented. MONSOON handles tri-state elements and environmental constraints occurring in industrial practice
using multiple-valued logics. Structural techniques increase the efficiency of the algorithm. A comparison with a state-of-the-art
approach shows a significant speed-up. Experimental results for large industrial circuits demonstrates the feasibility and
robustness of MONSOON. 相似文献