-
Survey of security analysis of security protocol implementations
- MENG Bo, LU Jin-tian, WANG De-jun, HE Xu-dong
-
JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE). 2018, 53(1):
1-18.
doi:10.6040/j.issn.1671-9352.2.2017.067
-
Abstract
(
1608 )
PDF (1057KB)
(
728
)
Save
-
References |
Related Articles |
Metrics
Security protocols are not only the important part of cyberspace security, but also are the key technology of providing cyberspace security. Security protocol implementations are the final objective of developing security protocols and people have paid a special attention to its security analysis. Around the hot issue, first, it briefly introduced the significance of security protocol implementations. Then, based on three assumptions respectively, 1)with security protocol client implementations and server implementations, 2)with security protocol client implementations, 3)without security protocol client implementations and server implementations, and the approaches used, for examples, program verification, model extraction, net-trace and dynamic taint analysis, the related research results are categorized, compared, analyzed and discussed. Finally, the conclusions are presented and the several future works of security analysis of security protocol implementations are introduced.