[1] Miller S P, Whalen M W, Cofer D D. Software model checking takes off[J]. Communications of the ACM, 2010, 53(2):58-64. [2] Jiang Huan, He Qing. A formal verification method for security protocol[J]. The Electronic World, 2019(2):56-57. [3] Navarrette J, Shankar S, Zhang X, et al. Formal modeling and analysis of multi-rogue backoff manipulation attacks in unlicensed networks[C]//2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020. Milan:IEEE, 2020:1-7. [4] Alshorman R. Toward proving the correctness of TCP protocol using CTL[J]. International Arab Journal of Information Technology, 2018, 16(3):407-414. [5] Chen Dawei, Dong Rongsheng, Guo Yunchuan, et al. SPIN model detection of IKEV2 protocol[J]. Computer Engineering, 2006, 5(57):164-166, 246. [6] Yi Huifan, Wan Liang, Huang Nana, et al. Research on attacker modeling method based on SPIN security protocol[J]. Information Network Security, 2018, 2(9):61-70. [7] 张卫杰. 基于反例的安全协议漏洞挖掘[D]. 成都:电子科技大学, 2019:26-35. [8] Holzmann G J, Lieberman W S. Design and validation of computer protocols[M]. Englewood Cliffs:Prentice Hall, 1991:135-145. [9] Zhong Xiaomei, Xiao Meihua, Li Wei, et al. Formal analysis and improvement of RFID ultra-lightweight authentication protocol RCIA[J]. Computer Engineering and Science, 2018, 40(12):2183-2192. [10] Wu Chang, Xiao Meihua, Luo Min, et al. Efficient and automatic generation of security protocol validation model[J]. Computer Engineering and Applications, 2010(2):83-86. |