Unknown

Dataset Information

0

A model based security testing method for protocol implementation.


ABSTRACT: The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

SUBMITTER: Fu YL 

PROVIDER: S-EPMC4106171 | biostudies-other | 2014

REPOSITORIES: biostudies-other

Similar Datasets

| S-EPMC10960480 | biostudies-literature
| S-EPMC4165803 | biostudies-other
| S-EPMC8604312 | biostudies-literature
| S-EPMC8425574 | biostudies-literature
| S-EPMC7380726 | biostudies-literature
| S-EPMC4322305 | biostudies-other
| S-EPMC8549859 | biostudies-literature
| S-EPMC6592501 | biostudies-literature
| S-EPMC10618252 | biostudies-literature
| S-EPMC6318553 | biostudies-literature