Dissertation > Excellent graduate degree dissertation topics show

Research on Methods of Security Assurance Based on Computer-Assisted Proof

Author: ShiZuoYuan
Tutor: PangJianMin
School: PLA Information Engineering University
Course: Computer Software and Theory
Keywords: Security guarantees Machine-assisted proof Coq Inductive Calculus of Constructions Formal Methods Protocol verification Program Verification
CLC: TP309
Type: Master's thesis
Year: 2007
Downloads: 60
Quote: 0
Read: Download Dissertation


With the wide application of computers and networks , many seemingly safe and proper protocol or software presents serious security problems , these problems from the design and implementation of other aspects . Therefore, an urgent need for appropriate , systematic approach to ensure the safety of the protocol and software . -Depth study protocols and software security assurance methods , based on computer-aided proof , and the feasibility and effectiveness of the theoretical and experimental verification . This paper, following the work done ; a more comprehensive analysis and comparison of formal methods and computer-aided proof tool , pointed out their advantages and limitations ; selected auxiliary prove higher - order logic - based interactive tool Coq as this study platform on the meta-language of Coq - inductive structure calculation basis for further research , analysis of the powerful features of Coq , provides a theoretical basis and technical assurance is based on the work the Coq to carry out a security guarantee ; -depth analysis of a variety of protocol verification method , respectively, for the stop-and-wait protocol and the Otway - Rees authentication protocol to establish a formal model of the relevant concepts and the nature of its formal description and conducted a rigorous computer - aided verification . The verification results show that the agreement to stop waiting in the design is correct and Otway - Rees authentication protocol type defects ; for program correctness , Hoare logic program to extract technology , the use of Coq done a lot of functional and the verification of imperative programs , to explore a system to guarantee the safety of the procedure . Formal and proof rigorous computer validation, verification process and the results show that , based on computer-aided proof system can effectively carry out the protocols and software security assurance work .

Related Dissertations

  1. Formal Analysis and Verification of a Transaction Coordination Protocol Named WS-TX for Web Services,TP393.09
  2. A Design and Implementation of IC Card Management System for Expressway Network Tolling,TP311.52
  3. Simulation and Analysis of Schedule Strategy of Reconfigrable HW System,TN791
  4. Extension and Application of Formal Verification Methods Based on Strand Space Model,TP393.08
  5. A Method for Formal Analysis of E-commerce Security Protocol,TP393.08
  6. A Model for Gene Local Shuffling and Its Application in ubiA Mutation,Q78
  7. An Analysis in COQ and the Research on Its Improvement in CTS,F275.3
  8. The Application Research on Algorithmic Framework in Software Reuse,TP311.52
  9. Formal Methods for Security Protocol Analysis and It’s Application,TP393
  10. Security protocol analysis method comparison and research,TP393.08
  11. Research on Software Design and Analysis Reuse Technique Based on Algorithmic Frame,TP311.52
  12. Security protocols based on strand space model analysis and validation password,O157.4
  13. Formal description of the software architecture,TP311.52
  14. TPN integration based on the B language and formal methods,TP312.1
  15. UML use case model B Formal Description Methods,TP311.52
  16. Semantic Checking of UML Model Based on Ontology Reasoning,TP311.52
  17. THP Coordination Protocol Formal Analysis and Verification,TP311.52
  18. The Analysis of Isabelle Theorem Prover and Its Application in PAR Method/PAR Platform,TP311.11
  19. Temporal Logic Model Checking Based on Behavior Research and Application,TP311.52
  20. Research of Coal Enterprises’ Safety Cost and Optimization,F406.72

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality
© 2012 www.DissertationTopic.Net  Mobile