Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2011, Vol. 34 ›› Issue (2): 54-57.doi: 10.13190/jbupt.201102.54.yangyy

• Papers • Previous Articles     Next Articles

The Construction of Changeable Intruder Model in Model Checking

  

  • Received:2010-04-17 Revised:2010-12-13 Online:2011-04-30 Published:2011-04-28

Abstract:

A construction scheme of the changeable intruder model is proposed. By defining the concept of abstract terms and their operation rules. The changeable intruder model (CIM) can greatly reduce the complexity of algebraic operations for intruders. And the CIM defines the intruder action library and the attack rule selection algorithm, which enables the analysts construct a changeable intruder model according to different protocols. As the actions of the intruder are composable, the CIM is able to dynamically adjust the intruder models. Changeable intruder model ensures both efficiency and correctness of the protocol analysis for model checkers.

Key words: security protocols, intruder model, algebraic operations, rewrite rules