Formal modeling and security analysis method of security protocol based on CPN
To solve the problem of modeling and analyzing with colored Petri net (CPN), which was determining vulnerabilities in hole location but couldn’t identify any attack path, and the problem of when the introduction of the attacker model, the number of possible message paths in the CPN formal model of s...
Saved in:
| Main Authors: | Xiang GONG, Tao FENG, Jinze DU |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2021-09-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021175/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
CPN Tools-Assisted Simulation and Verification of Nested Petri Nets
by: L. W. Dworza´nski, et al.
Published: (2015-03-01) -
Security analysis of the RSSP-II protocol and a novel security enhancement approach
by: FENG Tao, et al.
Published: (2025-06-01) -
Toward AI-Augmented Formal Verification: A Preliminary Investigation of ENGRU and Its Challenges
by: Chanon Dechsupa, et al.
Published: (2025-01-01) -
SAT-based lazy formal analysis method for security protocols
by: Chun-xiang GU, et al.
Published: (2014-11-01) -
Analysis and improvement of the BACnet/IP based on identity authentication
by: Pengshou XIE, et al.
Published: (2024-03-01)