Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus

Analyzing security protocol web implementations is a crucial part of web security. Based on the model extraction technology, this paper first defines SubJavaScript and SubPython languages, and then establishes mapping models from SubPython and SubJavaScript to Applied PI Calculus respectively, after...

Full description

Bibliographic Details
Main Authors: Xudong He, Qin Liu, Shuang Chen, Chin-Tser Huang, Dejun Wang, Bo Meng
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8981985/
_version_ 1818935301071962112
author Xudong He
Qin Liu
Shuang Chen
Chin-Tser Huang
Dejun Wang
Bo Meng
author_facet Xudong He
Qin Liu
Shuang Chen
Chin-Tser Huang
Dejun Wang
Bo Meng
author_sort Xudong He
collection DOAJ
description Analyzing security protocol web implementations is a crucial part of web security. Based on the model extraction technology, this paper first defines SubJavaScript and SubPython languages, and then establishes mapping models from SubPython and SubJavaScript to Applied PI Calculus respectively, after that, develops the semi-automatic model extraction tools SubPython2PV and SubJavaScript2PV to analyze the four widely used security protocol web implementations. The experiment shows that the four typical security protocol web implications have confidentiality, but lack of authentication.
first_indexed 2024-12-20T05:17:59Z
format Article
id doaj.art-6e977717db6b4f6b92e4454ed73cda3c
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-20T05:17:59Z
publishDate 2020-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-6e977717db6b4f6b92e4454ed73cda3c2022-12-21T19:52:06ZengIEEEIEEE Access2169-35362020-01-018266232663610.1109/ACCESS.2020.29716158981985Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI CalculusXudong He0https://orcid.org/0000-0002-2007-2576Qin Liu1https://orcid.org/0000-0002-8888-0211Shuang Chen2https://orcid.org/0000-0001-7717-9238Chin-Tser Huang3https://orcid.org/0000-0003-3983-972XDejun Wang4https://orcid.org/0000-0003-1370-8190Bo Meng5https://orcid.org/0000-0002-4377-0051School of Computer Science, South-Central University for Nationalities, Wuhan, ChinaSchool of Computer Science, South-Central University for Nationalities, Wuhan, ChinaSchool of Computer Science, South-Central University for Nationalities, Wuhan, ChinaDepartment of Computer Science and Engineering, University of South Carolina, Columbia, SC, USASchool of Computer Science, South-Central University for Nationalities, Wuhan, ChinaSchool of Computer Science, South-Central University for Nationalities, Wuhan, ChinaAnalyzing security protocol web implementations is a crucial part of web security. Based on the model extraction technology, this paper first defines SubJavaScript and SubPython languages, and then establishes mapping models from SubPython and SubJavaScript to Applied PI Calculus respectively, after that, develops the semi-automatic model extraction tools SubPython2PV and SubJavaScript2PV to analyze the four widely used security protocol web implementations. The experiment shows that the four typical security protocol web implications have confidentiality, but lack of authentication.https://ieeexplore.ieee.org/document/8981985/Security protocol implementationsmodel extractionSubJavaScriptSubPythonformal methodProVerif
spellingShingle Xudong He
Qin Liu
Shuang Chen
Chin-Tser Huang
Dejun Wang
Bo Meng
Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus
IEEE Access
Security protocol implementations
model extraction
SubJavaScript
SubPython
formal method
ProVerif
title Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus
title_full Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus
title_fullStr Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus
title_full_unstemmed Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus
title_short Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus
title_sort analyzing security protocol web implementations based on model extraction with applied pi calculus
topic Security protocol implementations
model extraction
SubJavaScript
SubPython
formal method
ProVerif
url https://ieeexplore.ieee.org/document/8981985/
work_keys_str_mv AT xudonghe analyzingsecurityprotocolwebimplementationsbasedonmodelextractionwithappliedpicalculus
AT qinliu analyzingsecurityprotocolwebimplementationsbasedonmodelextractionwithappliedpicalculus
AT shuangchen analyzingsecurityprotocolwebimplementationsbasedonmodelextractionwithappliedpicalculus
AT chintserhuang analyzingsecurityprotocolwebimplementationsbasedonmodelextractionwithappliedpicalculus
AT dejunwang analyzingsecurityprotocolwebimplementationsbasedonmodelextractionwithappliedpicalculus
AT bomeng analyzingsecurityprotocolwebimplementationsbasedonmodelextractionwithappliedpicalculus