The AVISPA tool for the automated validation of Internet security protocols and applications

被引:0
|
作者
Armando, A [1 ]
Basin, D
Boichut, Y
Chevalier, Y
Compagna, L
Cuellar, J
Drielsma, PH
Heám, PC
Kouchnarenko, O
Mantovani, J
Mödersheim, S
von Oheimb, D
Rusinowitch, M
Santiago, J
Turuani, M
Viganò, L
Vigneron, L
机构
[1] Univ Genoa, DIST, AI Lab, Genoa, Italy
[2] ETH, Informat Secur Grp, Zurich, Switzerland
[3] Univ Franche Comte, LIFC, F-25030 Besancon, France
[4] INRIA Lorraine, LORIA, Nancy, France
[5] Siemens AG, CT IC 3, D-8000 Munich, Germany
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
AVISPA is a push-button tool for the automated validation of Internet security-sensitive protocols and applications. It provides a modular and expressive formal language for specifying protocols and their security properties, and integrates different back-ends that implement a variety of state-of-the-art automatic analysis techniques. To the best of our knowledge, no other tool exhibits the same level of scope and robustness while enjoying the same performance and scalability.
引用
收藏
页码:281 / 285
页数:5
相关论文
共 50 条
  • [21] A tool for lazy verification of security protocols
    Chevalier, Y
    Vigneron, L
    16TH ANNUAL INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2001), PROCEEDINGS, 2001, : 373 - 376
  • [22] Comparative Study of Security Protocols to Enhance Security over Internet
    Prachi
    Dewan, Surbhi
    Pratibha
    2015 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES ACCT 2015, 2015, : 552 - 556
  • [23] Taxonomy and analysis of security protocols for Internet of Things
    Das, Ashok Kumar
    Zeadally, Sherali
    He, Debiao
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 : 110 - 125
  • [24] Automated Analysis of Secure Internet of Things Protocols
    Kim, Jun Young
    Holz, Ralph
    Hu, Wen
    Jha, Sanjay
    33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 238 - 249
  • [25] Migration of Internet security protocols to the IPSEC framework
    Sierra, JM
    Hernández, JC
    Ribagorda, A
    Jayaram, N
    36TH ANNUAL 2002 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2002, : 134 - 143
  • [26] Computationally sound, automated proofs for security protocols
    Cortier, W
    Warinschi, B
    PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2005, 3444 : 157 - 171
  • [27] Automated verification of selected equivalences for security protocols
    Blanchet, B
    Abadi, M
    Fournet, C
    LICS 2005: 20TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE - PROCEEDINGS, 2005, : 331 - 340
  • [28] Automated analysis of security protocols with global state
    Kremer, Steve
    Kuennemann, Robert
    JOURNAL OF COMPUTER SECURITY, 2016, 24 (05) : 583 - 616
  • [29] Automated analysis of security protocols with global state
    Kremer, Steve
    Kunnemann, Robert
    2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 163 - 178
  • [30] Decision Process for Automated Selection of Security Protocols
    Voelker, Lars
    Werle, Christoph
    Zitterbart, Martina
    2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 212 - 218