Security analysis of security protocol Swift implementations based on computational model
Analysis of security protocol Swift implementations in IOS platform is important to protect the security of IOS applications.Firstly,according to the security protocol Swift implementations,the SubSwift language,which was a subset of Swift language,was widely used in IOS system,and its BNF were spec...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2018-09-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018165/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539431095336960 |
---|---|
author | Bo MENG Xudong HE Jinli ZHANG Lili YAO Jintian LU |
author_facet | Bo MENG Xudong HE Jinli ZHANG Lili YAO Jintian LU |
author_sort | Bo MENG |
collection | DOAJ |
description | Analysis of security protocol Swift implementations in IOS platform is important to protect the security of IOS applications.Firstly,according to the security protocol Swift implementations,the SubSwift language,which was a subset of Swift language,was widely used in IOS system,and its BNF were specified.Secondly,the mapping model from SubSwift language to Blanchet calculus based on the operational semantic was presented which consisted of mapping rules,relationship from the statements and types in SubSwift language to Blanchet calculus.And then,a method of generating security protocol Blanchet calculus implementations from SubSwift language implementations was developed.Finally,security protocol Blanchet calculus implementation generation tool SubSwift2CV was developed with Antrl4 and Java language.At the same time,OpenID Connect,Oauth2.0 and TLS security protocol SubSwift language implementations were analyzed with SubSwift2CV and CryptoVerif. |
format | Article |
id | doaj-art-76e1290551a64dd2b4ff682deca091dd |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2018-09-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-76e1290551a64dd2b4ff682deca091dd2025-01-14T07:15:33ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-09-013917819059720895Security analysis of security protocol Swift implementations based on computational modelBo MENGXudong HEJinli ZHANGLili YAOJintian LUAnalysis of security protocol Swift implementations in IOS platform is important to protect the security of IOS applications.Firstly,according to the security protocol Swift implementations,the SubSwift language,which was a subset of Swift language,was widely used in IOS system,and its BNF were specified.Secondly,the mapping model from SubSwift language to Blanchet calculus based on the operational semantic was presented which consisted of mapping rules,relationship from the statements and types in SubSwift language to Blanchet calculus.And then,a method of generating security protocol Blanchet calculus implementations from SubSwift language implementations was developed.Finally,security protocol Blanchet calculus implementation generation tool SubSwift2CV was developed with Antrl4 and Java language.At the same time,OpenID Connect,Oauth2.0 and TLS security protocol SubSwift language implementations were analyzed with SubSwift2CV and CryptoVerif.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018165/security protocolimplementations securitySwift languageformal analysismodel extraction |
spellingShingle | Bo MENG Xudong HE Jinli ZHANG Lili YAO Jintian LU Security analysis of security protocol Swift implementations based on computational model Tongxin xuebao security protocol implementations security Swift language formal analysis model extraction |
title | Security analysis of security protocol Swift implementations based on computational model |
title_full | Security analysis of security protocol Swift implementations based on computational model |
title_fullStr | Security analysis of security protocol Swift implementations based on computational model |
title_full_unstemmed | Security analysis of security protocol Swift implementations based on computational model |
title_short | Security analysis of security protocol Swift implementations based on computational model |
title_sort | security analysis of security protocol swift implementations based on computational model |
topic | security protocol implementations security Swift language formal analysis model extraction |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018165/ |
work_keys_str_mv | AT bomeng securityanalysisofsecurityprotocolswiftimplementationsbasedoncomputationalmodel AT xudonghe securityanalysisofsecurityprotocolswiftimplementationsbasedoncomputationalmodel AT jinlizhang securityanalysisofsecurityprotocolswiftimplementationsbasedoncomputationalmodel AT liliyao securityanalysisofsecurityprotocolswiftimplementationsbasedoncomputationalmodel AT jintianlu securityanalysisofsecurityprotocolswiftimplementationsbasedoncomputationalmodel |