期刊文献+

基于Hoare逻辑的密码软件安全性形式化验证方法

Formal verification method for cryptographic software security based on Hoare logic
原文传递
导出
摘要 为了解决密码软件安全性验证效率和准确率低的问题,提出了基于Hoare逻辑的密码软件安全性形式化验证方法。首先对密码软件的主要性质进行描述,然后通过密码软件运行时随机向量的分析,得到密码软件运行的矩阵表达式,再将其进行线性变换,计算密码软件运行时数据的方差和协方差矩阵,获得密码软件运行时数据矩阵的主成分空间,并对密码软件运行的主成分进行分析;最后,利用密码软件的逻辑模型和软件运行的状态集合对密码软件安全形式化验证的流程进行分析,建立密码软件的运行模型并设置安全属性,并将密码软件运行时出现的故障进行标记和处理,得到密码软件运行的安全结果,从而实现密码软件安全性形式化的验证。实验结果表明,采用该方法对密码软件的安全性进行验证具有较高的效率,且能够准确地验证密码软件的安全。 In order to solve the problem of low efficiency and low accuracy of cryptographic software security verification,a formal cryptographic software security verification method based on Hoare logic is proposed.The main properties of the cryptographic software are described.Through the analysis of the random vector of the cryptographic software runtime,the matrix expression of the cryptographic software is obtained,which is linearly transformed,and the variance and covariance matrix of the cryptographic software runtime data are calculated to obtain the cryptographic software.The principal component space of the runtime data matrix,and analyzes the principal components of the cryptographic software operation;analyzes the cryptographic software security formal verification process by using the logic model of the cryptographic software and the state set of the software operation,and establishes the running model of the cryptographic software.And set the security attributes,mark and process the faults that occur when the cryptographic software is running,obtain the security results of the cryptographic software running,and realize the formal verification of the cryptographic software security.The experimental results show that the method has high efficiency when verifying the security of cryptographic software,and can accurately verify the security of cryptographic software.
作者 肖堃 XIAO Kun(School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu 611731,China)
出处 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2019年第4期1301-1306,共6页 Journal of Jilin University:Engineering and Technology Edition
基金 国家科技重大专项项目(2014ZX03002001)
关键词 计算机系统结构 霍尔逻辑 密码软件 安全性验证 computer systems architecture Hoare logic cipher software safety verification
  • 相关文献

参考文献10

二级参考文献66

  • 1罗时中,廖列文,王春晓.铝用膏状软钎剂的研制[J].广州化工,2005,33(3):31-35. 被引量:4
  • 2徐迎迎,高飞,尚锋影,朱君礼.新的云安全解决方案及其关键技术[J].华中科技大学学报(自然科学版),2012,40(S1):74-78. 被引量:3
  • 3SHI RunHua,HUANG LiuSheng,YANG Wei,ZHONG Hong.Quantum secret sharing between multiparty and multiparty with Bell states and Bell measurements[J].Science China(Physics,Mechanics & Astronomy),2010,53(12):2238-2244. 被引量:17
  • 4中华人民共和国国家和发展改革委员会.DL/T645-2007多功能电能表通信协议[S].2007.
  • 5Q/GDW1365 -2013,智能电能表信息交换安全认证技术规范[S]..
  • 6Shabtai A,Fledel Y,Kanonov U,et al.Google android:A comprehensive security assessment[J].IEEE Security and Privacy,2010,8(2):35-44.
  • 7Shabtai A,Fledel Y,Kanonov U,et al.Google android:A state-of-the-art review of security mechanisms[J].arXiv Preprint arXiv,2009:0912.5101.
  • 8Smalley S,Craig R.Security enhanced(se)android:Bringing flexible mac to android[C]//20th Annual Network and Distributed System Security Symposium,2013.
  • 9Lange M,Liebergeld S,Lackorzynski A,et al.L4Android:A generic operating system framework for secure smartphones[C]//Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices,2011:39-50.
  • 10Shekhar S,Dietz M,Wallach DS.Adsplit:Separating smartphone advertising from applications[J].CoRR,abs/1202.4030,2012.

共引文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部