A Model Based Security Testing Method for Protocol Implementation

作者:Fu Yu Long; Xin Xiao Long*
来源:The Scientific World Journal, 2014, 2014: 632154.
DOI:10.1155/2014/632154

摘要

The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.