메뉴 건너뛰기




Volumn , Issue , 2008, Pages 109-118

Slede: A domain-specific verification framework for sensor network security protocol implementations

Author keywords

Intruder generation; Model checking; Security protocols; Sensor networks

Indexed keywords

AUTOMATED FORMAL VERIFICATIONS; DO-MAINS; DOMAIN TERMS; FAULT SCENARIOS; FORMAL DESCRIPTIONS; FORMAL VERIFICATIONS; INTRUDER GENERATION; MODEL CONSTRUCTIONS; NETWORK TOPOLOGIES; OF SENSORS; SECURITY PROTOCOL SPECIFICATIONS; SECURITY PROTOCOLS; SENSOR NETWORK SECURITIES; SYSTEM FAILURES; VERIFICATION FRAMEWORKS; VERIFICATION PROCESSES;

EID: 56749092205     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1352533.1352551     Document Type: Conference Paper
Times cited : (34)

References (45)
  • 5
    • 0034822279 scopus 로고    scopus 로고
    • An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
    • Cape Breton, Nova Scotia, Canada, June, IEEE Computer Society
    • B. Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In 14th IEEE Computer Security Foundations Workshop (CSFW-14), pages 82-96, Cape Breton, Nova Scotia, Canada, June 2001. IEEE Computer Society.
    • (2001) 14th IEEE Computer Security Foundations Workshop (CSFW-14) , pp. 82-96
    • Blanchet, B.1
  • 7
    • 0025388480 scopus 로고
    • A security scheme for resource sharing over a network
    • J. Burns and C. J. Mitchell. A security scheme for resource sharing over a network. Comput. Secur., 9(1):67-75, 1990.
    • (1990) Comput. Secur , vol.9 , Issue.1 , pp. 67-75
    • Burns, J.1    Mitchell, C.J.2
  • 9
    • 4244142012 scopus 로고    scopus 로고
    • Formal methods in the design of cryptographic protocols (state of the art)
    • Technical Report SSC/1999/38, Swiss Federal Institute of Technology EPFL, nov
    • L. Buttyan. Formal methods in the design of cryptographic protocols (state of the art). Technical Report SSC/1999/38, Swiss Federal Institute of Technology (EPFL), nov 1999.
    • (1999)
    • Buttyan, L.1
  • 13
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • mar
    • D. Dolev and A. C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(12): 198-208, mar 1983.
    • (1983) IEEE Transactions on Information Theory , vol.IT-29 , Issue.12 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 17
    • 24144470036 scopus 로고    scopus 로고
    • Cryptographic protocol analysis on real C code
    • R. Cousot, editor, VMCAI'05, of, Paris, France, Jan, Springer
    • J. Goubault-Larrecq and F. Parrennes. Cryptographic protocol analysis on real C code. In R. Cousot, editor, VMCAI'05, volume 3385 of Lecture Notes in Computer Science, pages 363-379, Paris, France, Jan. 2005. Springer.
    • (2005) Lecture Notes in Computer Science , vol.3385 , pp. 363-379
    • Goubault-Larrecq, J.1    Parrennes, F.2
  • 18
    • 56749168682 scopus 로고    scopus 로고
    • Slede: Event-based specification of sensor network security protocols
    • Y. Hanna and H. Rajan. Slede: event-based specification of sensor network security protocols. SIGSOFT Softw. Eng. Notes, 31(6): 1-2, 2006.
    • (2006) SIGSOFT Softw. Eng. Notes , vol.31 , Issue.6 , pp. 1-2
    • Hanna, Y.1    Rajan, H.2
  • 19
    • 19144362424 scopus 로고    scopus 로고
    • K. Havelund and G. Rosu. Monitoring Java programs with Java PathExplorer. In K. Havelund and G. Roşu, editors, Runtime Verification, 55 of Electronic Notes in Theoretical Computer Science. Elsevier, 23July 2001.
    • K. Havelund and G. Rosu. Monitoring Java programs with Java PathExplorer. In K. Havelund and G. Roşu, editors, Runtime Verification, volume 55 of Electronic Notes in Theoretical Computer Science. Elsevier, 23July 2001.
  • 23
    • 18944390941 scopus 로고    scopus 로고
    • The model checker SPIN
    • G. J. Holzmann. The model checker SPIN. IEEE Trans. Softw. Eng., 23(5):279-295, 1997.
    • (1997) IEEE Trans. Softw. Eng , vol.23 , Issue.5 , pp. 279-295
    • Holzmann, G.J.1
  • 24
    • 3142724267 scopus 로고    scopus 로고
    • Directed Diffusion: A Scalable and Robust Communication
    • August
    • C. Intanagonwiwat, R. Govindan, and D. Estrin. Directed Diffusion: A Scalable and Robust Communication. MobiCOM '00, August 2000.
    • (2000) MobiCOM '00
    • Intanagonwiwat, C.1    Govindan, R.2    Estrin, D.3
  • 25
    • 0024665744 scopus 로고
    • Analyzing encryption protocols using formal verification techniques
    • may
    • R. A. Kemmerer. Analyzing encryption protocols using formal verification techniques. IEEE Journal on Selected Areas in Communications, 7(4):448-457, may 1989.
    • (1989) IEEE Journal on Selected Areas in Communications , vol.7 , Issue.4 , pp. 448-457
    • Kemmerer, R.A.1
  • 28
    • 0026837069 scopus 로고
    • An automatic search for security flaws in key management schemes
    • D. Longley and S. Rigby. An automatic search for security flaws in key management schemes. Comput. Secur., 11(1):75-89, 1992.
    • (1992) Comput. Secur , vol.11 , Issue.1 , pp. 75-89
    • Longley, D.1    Rigby, S.2
  • 31
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • C. Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2): 113-131, 1996.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 33
    • 0023295108 scopus 로고
    • The interrogator: Protocol security analysis
    • J. K. Millen, S. C. Clark, and S. B. Freeman. The interrogator: protocol security analysis. IEEE Trans. Softw. Eng., 13(2):274-288, 1987.
    • (1987) IEEE Trans. Softw. Eng , vol.13 , Issue.2 , pp. 274-288
    • Millen, J.K.1    Clark, S.C.2    Freeman, S.B.3
  • 35
    • 56749164388 scopus 로고    scopus 로고
    • nesC Compiler. http://sourceforge.net/projects/nescc.
    • nesC Compiler. http://sourceforge.net/projects/nescc.
  • 36
    • 0002088427 scopus 로고
    • A note on the use of timestamps as nonces
    • B. C. Neuman and S. G. Stubblebine. A note on the use of timestamps as nonces. SIGOPS Oper. Syst. Rev., 27(2): 10-14, 1993.
    • (1993) SIGOPS Oper. Syst. Rev , vol.27 , Issue.2 , pp. 10-14
    • Neuman, B.C.1    Stubblebine, S.G.2
  • 38
    • 1542347185 scopus 로고    scopus 로고
    • Bogor: An extensible and highly-modular software model checking framework
    • New York, NY, USA, ACM Press
    • Robby, M. B. Dwyer, and J. Hatcliff. Bogor: an extensible and highly-modular software model checking framework. In ESEC/FSE-11, pages 267-276, New York, NY, USA, 2003. ACM Press.
    • (2003) ESEC/FSE-11 , pp. 267-276
    • Robby, M.1    Dwyer, B.2    Hatcliff, J.3
  • 40
    • 24644523336 scopus 로고    scopus 로고
    • S. Schneider. Verifying authentication protocol implementations. In FMOODS '02: Proceedings of the IFIP TC6/WG6.1 Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems V, pages 5-24, Deventer, The Netherlands, The Netherlands, 2002. Kluwer, B.V.
    • S. Schneider. Verifying authentication protocol implementations. In FMOODS '02: Proceedings of the IFIP TC6/WG6.1 Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems V, pages 5-24, Deventer, The Netherlands, The Netherlands, 2002. Kluwer, B.V.
  • 42
    • 0032623470 scopus 로고    scopus 로고
    • Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification
    • P. G. Stefanos Gritzalis, Diomidis Spinellis. Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification. Computer Communications, 22(8):697-709, 1999.
    • (1999) Computer Communications , vol.22 , Issue.8 , pp. 697-709
    • Stefanos Gritzalis, P.G.1    Spinellis, D.2
  • 43
    • 37049032133 scopus 로고    scopus 로고
    • Model Checking Wireless Sensor Network Security Protocols: TinySec + LEAP
    • WSAN'07, Albacete Spain, September, Springer
    • L. Tobarra, D. Cazorla, F. Cuartero, G. DÂaz, and E. Cambronero. Model Checking Wireless Sensor Network Security Protocols: TinySec + LEAP. In WSAN'07, pages 95-106, Albacete (Spain), September 2007. IFIP Main Series, Springer.
    • (2007) IFIP Main Series , pp. 95-106
    • Tobarra, L.1    Cazorla, D.2    Cuartero, F.3    DÂaz, G.4    Cambronero, E.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.