Papers by Keyword: Formal Analysis

Paper TitlePage

Authors: Ze Ming Ren, Ling Yun Xu, Qian Liu, An Dong Fan
Abstract: In order to reduce the amount of data exchange in E-mail transmission process, a non-repudiation E-mail transmission protocol was proposed based on the digital signature technology. By using the formal analysis based on the extended strand space method, strict authentication and analysis were conducted for the security of data transmission and the identity of both the transmitter and receiver. Furthermore, the safety and effectiveness of this protocol were verified.
Authors: Chun Xu, Yue Lin, Ya Nan Gao, Song Tao Fan
Abstract: An improved clock synchronization algorithm for time triggered architecture has been proposed in this paper. A single reference real time is added in the system, so periodically calibration to real time can be achieved. This algorithm is based on the classical Welch-Lynch[1] fault tolerant clock synchronization process. Systematic clock drift problem has been solved by using the algorithm. Formal analysis is presented, and verification is taken on Matlab/Simulink platform. Simulation result has verified the performance of the algorithm, and the clock difference is bounded as expected.
Authors: Juan Zhang, Guo Qi Li, Xiao Liu
Abstract: Safety-critical system attracts more attention in recent years. During the development of safety-critical systems, verification plays the most important role and includes many high cost activities. Testing and formal analysis are two mainstream ways for verification. This paper describes new tools and procedures for testing and formal analysis for verification of safety-critical systems. Compare them in detail in a case study. Conclusion and future works are given finally.
Authors: Qi Wang, Yong Bin Wang
Abstract: Dynamic evolving characteristic is the key of modeling internetware architecture. However, it is lack of formal description and theoretical analysis for model dynamic evolution for the moment, a new kind of internetware dynamic evolving modeling method based on Seal-Calculus of process algebra is presented and formalized analysis is conducted for evolving process in practical applications, which is convenient to express obviously and strictly the dynamic process of the system, providing a new means and theoretical basis.
Authors: Ling Tie, Di He
Abstract: Proxy mobile ipv6 protocol is a mandatory protocol to support inter-working among heterogeneous mobile broadband networks. In order to support compatibility to IPv4 network, a mobility infrastructure in the proxy mobile ipv6 that provide ipv4 extension is presented in this article. An authentication protocol based on authentication option is proposed to protect this proxy mobile IPv6 protocol with IPv4 support. A SVO formal Analysis method is used to prove the security of this protocol.
Authors: Fang Wang
Abstract: Researchers have proposed several security protocols to protect the electronic commerce security in these years; however, not all of them are secure enough. This article extends model checking method with Casper/FDR2 to model and analyze a new electronic protocol. Attacks are found in the protocol and their mechanisms are discussed. A variety of solutions are given to different security flaws. The improved protocol is proven to be robust and secure.
Showing 1 to 6 of 6 Paper Titles