A model based security testing method for protocol implementation.
Ontology highlight
ABSTRACT: The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.
SUBMITTER: Fu YL
PROVIDER: S-EPMC4106171 | biostudies-other | 2014
REPOSITORIES: biostudies-other
ACCESS DATA