Security analysis of security protocol Swift implementations based on computational model

Analysis of security protocol Swift implementations in IOS platform is important to protect the security of IOS applications.Firstly,according to the security protocol Swift implementations,the SubSwift language,which was a subset of Swift language,was widely used in IOS system,and its BNF were spec...

Full description

Saved in:
Bibliographic Details
Main Authors: Bo MENG, Xudong HE, Jinli ZHANG, Lili YAO, Jintian LU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2018-09-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018165/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539431095336960
author Bo MENG
Xudong HE
Jinli ZHANG
Lili YAO
Jintian LU
author_facet Bo MENG
Xudong HE
Jinli ZHANG
Lili YAO
Jintian LU
author_sort Bo MENG
collection DOAJ
description Analysis of security protocol Swift implementations in IOS platform is important to protect the security of IOS applications.Firstly,according to the security protocol Swift implementations,the SubSwift language,which was a subset of Swift language,was widely used in IOS system,and its BNF were specified.Secondly,the mapping model from SubSwift language to Blanchet calculus based on the operational semantic was presented which consisted of mapping rules,relationship from the statements and types in SubSwift language to Blanchet calculus.And then,a method of generating security protocol Blanchet calculus implementations from SubSwift language implementations was developed.Finally,security protocol Blanchet calculus implementation generation tool SubSwift2CV was developed with Antrl4 and Java language.At the same time,OpenID Connect,Oauth2.0 and TLS security protocol SubSwift language implementations were analyzed with SubSwift2CV and CryptoVerif.
format Article
id doaj-art-76e1290551a64dd2b4ff682deca091dd
institution Kabale University
issn 1000-436X
language zho
publishDate 2018-09-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-76e1290551a64dd2b4ff682deca091dd2025-01-14T07:15:33ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-09-013917819059720895Security analysis of security protocol Swift implementations based on computational modelBo MENGXudong HEJinli ZHANGLili YAOJintian LUAnalysis of security protocol Swift implementations in IOS platform is important to protect the security of IOS applications.Firstly,according to the security protocol Swift implementations,the SubSwift language,which was a subset of Swift language,was widely used in IOS system,and its BNF were specified.Secondly,the mapping model from SubSwift language to Blanchet calculus based on the operational semantic was presented which consisted of mapping rules,relationship from the statements and types in SubSwift language to Blanchet calculus.And then,a method of generating security protocol Blanchet calculus implementations from SubSwift language implementations was developed.Finally,security protocol Blanchet calculus implementation generation tool SubSwift2CV was developed with Antrl4 and Java language.At the same time,OpenID Connect,Oauth2.0 and TLS security protocol SubSwift language implementations were analyzed with SubSwift2CV and CryptoVerif.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018165/security protocolimplementations securitySwift languageformal analysismodel extraction
spellingShingle Bo MENG
Xudong HE
Jinli ZHANG
Lili YAO
Jintian LU
Security analysis of security protocol Swift implementations based on computational model
Tongxin xuebao
security protocol
implementations security
Swift language
formal analysis
model extraction
title Security analysis of security protocol Swift implementations based on computational model
title_full Security analysis of security protocol Swift implementations based on computational model
title_fullStr Security analysis of security protocol Swift implementations based on computational model
title_full_unstemmed Security analysis of security protocol Swift implementations based on computational model
title_short Security analysis of security protocol Swift implementations based on computational model
title_sort security analysis of security protocol swift implementations based on computational model
topic security protocol
implementations security
Swift language
formal analysis
model extraction
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018165/
work_keys_str_mv AT bomeng securityanalysisofsecurityprotocolswiftimplementationsbasedoncomputationalmodel
AT xudonghe securityanalysisofsecurityprotocolswiftimplementationsbasedoncomputationalmodel
AT jinlizhang securityanalysisofsecurityprotocolswiftimplementationsbasedoncomputationalmodel
AT liliyao securityanalysisofsecurityprotocolswiftimplementationsbasedoncomputationalmodel
AT jintianlu securityanalysisofsecurityprotocolswiftimplementationsbasedoncomputationalmodel