Back to Search
Start Over
Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus
- Source :
- IEEE Access, Vol 8, Pp 26623-26636 (2020)
- Publication Year :
- 2020
- Publisher :
- IEEE, 2020.
-
Abstract
- Analyzing security protocol web implementations is a crucial part of web security. Based on the model extraction technology, this paper first defines SubJavaScript and SubPython languages, and then establishes mapping models from SubPython and SubJavaScript to Applied PI Calculus respectively, after that, develops the semi-automatic model extraction tools SubPython2PV and SubJavaScript2PV to analyze the four widely used security protocol web implementations. The experiment shows that the four typical security protocol web implications have confidentiality, but lack of authentication.
- Subjects :
- Model extraction
Authentication
Thesaurus (information retrieval)
SubPython
General Computer Science
Computer science
business.industry
Distributed computing
General Engineering
Cryptographic protocol
Formal methods
Internet security
SubJavaScript
ProVerif
General Materials Science
formal method
Security protocol implementations
model extraction
lcsh:Electrical engineering. Electronics. Nuclear engineering
business
Implementation
lcsh:TK1-9971
Subjects
Details
- Language :
- English
- ISSN :
- 21693536
- Volume :
- 8
- Database :
- OpenAIRE
- Journal :
- IEEE Access
- Accession number :
- edsair.doi.dedup.....11111945ad2c389c12ab1fdb4878d955