The AVISPA tool for the automated validation of Internet security protocols and applications

被引:0
|
作者
Armando, A [1 ]
Basin, D
Boichut, Y
Chevalier, Y
Compagna, L
Cuellar, J
Drielsma, PH
Heám, PC
Kouchnarenko, O
Mantovani, J
Mödersheim, S
von Oheimb, D
Rusinowitch, M
Santiago, J
Turuani, M
Viganò, L
Vigneron, L
机构
[1] Univ Genoa, DIST, AI Lab, Genoa, Italy
[2] ETH, Informat Secur Grp, Zurich, Switzerland
[3] Univ Franche Comte, LIFC, F-25030 Besancon, France
[4] INRIA Lorraine, LORIA, Nancy, France
[5] Siemens AG, CT IC 3, D-8000 Munich, Germany
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
AVISPA is a push-button tool for the automated validation of Internet security-sensitive protocols and applications. It provides a modular and expressive formal language for specifying protocols and their security properties, and integrates different back-ends that implement a variety of state-of-the-art automatic analysis techniques. To the best of our knowledge, no other tool exhibits the same level of scope and robustness while enjoying the same performance and scalability.
引用
收藏
页码:281 / 285
页数:5
相关论文
共 50 条
  • [1] Automated Security Protocol Analysis With the AVISPA Tool
    Vigano, Luca
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 155 : 61 - 86
  • [2] A comparative study of security protocols validation tools: HERMES vs. AVISPA
    Hussain, M
    Seret, D
    8TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U303 - U308
  • [3] Internet security protocols
    Fumy, W
    STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 186 - 208
  • [4] A Comparative Study of Protocols' Security Verification Tools: Avispa, Scyther, ProVerif, and Tamarin
    Belfaik, Yousra
    Lotfi, Yousra
    Sadqi, Yassine
    Safi, Said
    DIGITAL TECHNOLOGIES AND APPLICATIONS, ICDTA 2024, VOL 2, 2024, 1099 : 118 - 128
  • [5] Analyzing Internet security protocols
    Yasinsac, A
    Childs, J
    SIXTH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING, 2001, : 149 - 159
  • [6] Automated Composition of Security Protocols
    Bela, Genge
    Ignat, Iosif
    Piroska, Haller
    2009 IEEE 5TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2009, : 251 - +
  • [7] Automated design of security protocols
    Chen, H
    Clark, JA
    Jacob, JL
    CEC: 2003 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-4, PROCEEDINGS, 2003, : 2181 - 2188
  • [8] Automated design of security protocols
    Hao, C
    Clark, JA
    Jacob, JL
    COMPUTATIONAL INTELLIGENCE, 2004, 20 (03) : 503 - 516
  • [9] Static validation of security protocols
    Bodei, Chiara
    Buchholtz, Mikael
    Degano, Pierpaolo
    Nielson, Flemming
    Nielson, Hanne
    JOURNAL OF COMPUTER SECURITY, 2005, 13 (03) : 347 - 390
  • [10] Lightweight Security Protocols for the Internet of Things
    Wu, Xin-Wen
    Yang, En-Hui
    Wang, Junhu
    2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,