13.07.2015 Views

GRAFOS

GRAFOS

GRAFOS

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

MotivationThis paper is intended to present how to model attack scenarios to be injectedduring runtime.Abstract - In this paper we consider the validation of security protocols,whose aim to ensure some security properties when the communicationmedium is not reliable. The goal is to uncover protocol vulnerabilities that anattacker can exploit and cause security failures. Our approach uses a faultinjector to inject attacks into a communication system and observe wheterthe security properties are violated. One of the key problems is: how togenerate successful attacks that will indicate the existence ofvulnerabilities? We propose an approach tht is similar to model-based testing,as we derive attack scenarios from an attack model representing knownattacks to the protocol under test. The approach can be completelysupported by tools, , as is shown in the paper.MARCO ANTONIO GARCIA DE CARVALHOMarço de 2010Grafos e Aplicações

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!