scholarly journals Security analysis of network protocols through model checking: a case study on mobile IPv6

2015 ◽  
Vol 9 (10) ◽  
pp. 1072-1084 ◽  
Author(s):  
Zohreh Saffarian Eidgahi ◽  
Vahid Rafe
Author(s):  
Florian Kammüller ◽  
Christian W. Probst ◽  
Franco Raimondi

In this chapter, the authors give a short overview of the state of the art of formal verification techniques to the engineering of safe and secure systems. The main focus is on the support of security of real-world systems with mechanized verification techniques, in particular model checking. Based on prior experience with safety analysis—in particular the TWIN elevator (ThyssenKrupp) case study—the current case study ventures into the rising field of social engineering attacks on security. This main focus and original contribution of this chapter considers the security analysis of an insider attack illustrating the benefits of model checking with belief logics and actor system modeling.


2021 ◽  
pp. 100004
Author(s):  
Zheng Fang ◽  
Hao Fu ◽  
Tianbo Gu ◽  
Zhiyun Qian ◽  
Trent Jaeger ◽  
...  

Author(s):  
Simon Bäumler ◽  
Michael Balser ◽  
Andriy Dunets ◽  
Wolfgang Reif ◽  
Jonathan Schmitt

Sign in / Sign up

Export Citation Format

Share Document