Learn More
Fair exchange protocols have been studied intensively in recent years. But a lot of methods are still performed manually. In this paper an automatic method is proposed for analyzing fair exchange protocols. In this method we formalize security properties of fairness and non-repudiation in TLA (temporal logic of action) and define common predicates to make(More)
To solve the problem that it is difficult to detect the failure-type hardware Trojan, this paper selects the failure-type hardware Trojan as the research subjects, putting forward the detection principles of failure-type hardware Trojan based on state transition diagram. It also designs and realizes the detection algorithm as well as provides the relative(More)
Aiming at the technique crux of system failure testing and function reconstruction, we carry on a research to the distilling method of the Boolean relation data. First, start with the analysis to the working wave character of target chip in the waveform confined space of system, and then on this foundation, the corresponding logic relation expression(More)
DDoS attack and defense is regarded as a multistage signaling game with observable actions. Its extensive form is given out, and its perfect bayesian nash equilibrium is solved. The current problems encountered by DDoS attack defense are discussed. Theoretical analysis proves the feasibility and effectiveness of the service hopping strategy. This paper(More)
TA4SP is a state-of-art tool of AVISPA that can automatically verify security protocol with unbounded number of parallel sessions. But it still has some limitations and can’t verify hierarchy of authentication automatically. In this paper, we use an approximation-based model to define security protocol and design an algorithm close to the real(More)
  • 1