2018
DOI: 10.3390/app8122543
|View full text |Cite
|
Sign up to set email alerts
|

A Security Analysis Method for Security Protocol Implementations Based on Message Construction

Abstract: Security protocols are integral to the protection of cyberspace against malicious attacks. Therefore, it is important to be confident in the security of a security protocol. In previous years, people have worked on security of security protocol abstract specification. However, in recent years, people have found that this is not enough and have begun focusing on security protocol implementation. In order to evaluate the security of security protocol implementations, in this paper, firstly, we proposed the Messa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 31 publications
0
1
0
Order By: Relevance
“…Program verification methods and model extraction methods depend on obtaining and understanding SPI. Currently, obtaining the SPI [5] is impractical because, with the strengthening of intellectual property protection, it is difficult to obtain SPI. In addition, owing to the widespread application of code obfuscation technology, understanding and analyzing obfuscated codes is becoming a challenge for researchers and experts in academic and industrial worlds.…”
Section: Listsmentioning
confidence: 99%
“…Program verification methods and model extraction methods depend on obtaining and understanding SPI. Currently, obtaining the SPI [5] is impractical because, with the strengthening of intellectual property protection, it is difficult to obtain SPI. In addition, owing to the widespread application of code obfuscation technology, understanding and analyzing obfuscated codes is becoming a challenge for researchers and experts in academic and industrial worlds.…”
Section: Listsmentioning
confidence: 99%
“…This vulnerability arises when an attacker uses faulty input validation in SQL queries to run unauthorized commands. If not appropriately mitigated, SQL injection can result in data breaches, data manipulation, and unauthorized access to sensitive information kept in SAS databases (Lu et al, 2018).…”
Section: Common Security Risks In Sas Applicationsmentioning
confidence: 99%