- 4
- 0
- 约1.53万字
- 约 26页
- 2017-03-09 发布于上海
- 举报
Theory Generation for Security Protocols安全协议理论的生成
Attack Graphs Jeannette M. Wing Automatic Generation and Analysis of Attack Graphs joint work with Oleg Sheyner, Somesh Jha (Wisconsin),Roman V. Lototski, Alexey Roschyna, Arvind Kannan, and Meera Sridhar Example of Attack Graph Developed by a Professional Red Team Sandia Red Team “White Board” attack tree from DARPA CC20008 Information battle space preparation experiment Problem Statement Problem: Generating attack graphs by hand is tedious, error-prone, and impractical for large systems. Our Goal: Automate the generation and analysis of attack graphs. Generation Must be fast and completely automatic Must handle large, realistic examples Should guarantee properties of attack graphs Analysis Must enable security analysis by system administrators Should support incremental, partial specification Overview of Our Method Why Model Checking? Pragmatic reasons Off-the-shelf technology Major verification success story Technical reasons Fast, automatic Large state spaces Handles safety and liveness properties Generates counterexamples Counterexample = Attack Definition of Attack Graph Given a finite state model, M, of network a security property ? An attack is an execution of M that violates ?. An attack graph is a set of attacks of M. Properties of Attack Graphs Sound An attack generated violates ?. Exhaustive All possible attacks are represented in G. Succinct Only relevant states are contained in G. Only relevant transitions are contained in G. We developed two algorithms that satisfy these properties. Explicit-State Attack Graph Generation Algorithm Inputs M F = LTL property (safety or liveness) Algorithm Interpret network model M and security property F as Buchi automata [Gerth et al.95]. M and F induce languages L(M ) and L(F). Compute intersection M ? ~F of Buchi automata. L(M ? ~F) = L(M )\L(F) = executions of M that violate F. Derive G from strongly connected components of intersection automaton [Tarjan72]. Performance (Explicit-State) An Illu
您可能关注的文档
- The story of the eagle老鹰的故事.ppt
- The Story of William Penn Penns Valley Publishers威廉佩恩生物谷出版商的故事.ppt
- The Strategy Process Thammasat University战略过程国立法政大学.ppt
- THE STRUCTURE OF ENGLISH University of Cagliari英国卡利亚里大学的结构.ppt
- The Strange Case of Dr奇怪的情况. Jekyll and Mr. Hyde TypePad.ppt
- The story of Zacchaeus KJV Anniversary撒该的故事新译本的周年纪念日.ppt
- The structure of scientific revolution Bethel University科学革命的结构伯特利大学.ppt
- The Structure and Properties of Polymers University 高分子材料的结构与性能.ppt
- The Structure of Scientific Revolutions Wikispaces科学革命的结构Wikispaces.ppt
- The Structure of the Atom Warren County Public Schools原子的结构克里县公立学校.ppt
- 2025-2026学年天津市和平区高三(上)期末数学试卷(含解析).pdf
- 2025-2026学年云南省楚雄州高三(上)期末数学试卷(含答案).pdf
- 2025-2026学年甘肃省天水市张家川实验中学高三(上)期末数学试卷(含答案).docx
- 2025-2026学年福建省厦门市松柏中学高二(上)期末数学试卷(含答案).docx
- 2025-2026学年广西钦州市高一(上)期末物理试卷(含答案).docx
- 2025-2026学年河北省邯郸市临漳县九年级(上)期末化学试卷(含答案).docx
- 2025-2026学年河北省石家庄二十三中七年级(上)期末历史试卷(含答案).docx
- 2025-2026学年海南省五指山市九年级(上)期末化学试卷(含答案).docx
- 2025-2026学年河北省唐山市玉田县九年级(上)期末化学试卷(含答案).docx
- 2025-2026学年河北省邢台市市区九年级(上)期末化学试卷(含答案).docx
最近下载
- 2024浙江嘉兴市众业供电服务有限公司招聘笔试备考试题及答案解析.docx VIP
- Razer雷蛇灵刃15标准版-GTX1660 Ti(RZ09-03009)中文手册.pdf
- ISO90012015标准.ppt VIP
- 2025届湖南新高考教学教研联盟高三第二次联考数学试卷及参考答案.pdf VIP
- 辐射防护手册 第1分册 辐射源与屏蔽_李德平,潘自强主编_北京:原子能出版社_1987.08_10263208_P480.pdf
- 机器人行走机构及控制系统设计和实现计算机专业.pdf VIP
- 建筑装饰装修-分部工程质量验收记录表.doc VIP
- 2024年黑龙江省大庆市中考数学试题(原卷版).pdf
- 2025嘉兴市众业供电服务有限公司招聘74人笔试备考试题及答案解析.docx VIP
- (高清版)DB34∕T 4706-2024 手术智慧医疗系统建设规范.docx VIP
原创力文档

文档评论(0)