The AVISPA tool for the automated validation of Internet security protocols and applications

被引:0
|
作者
Armando, A [1 ]
Basin, D
Boichut, Y
Chevalier, Y
Compagna, L
Cuellar, J
Drielsma, PH
Heám, PC
Kouchnarenko, O
Mantovani, J
Mödersheim, S
von Oheimb, D
Rusinowitch, M
Santiago, J
Turuani, M
Viganò, L
Vigneron, L
机构
[1] Univ Genoa, DIST, AI Lab, Genoa, Italy
[2] ETH, Informat Secur Grp, Zurich, Switzerland
[3] Univ Franche Comte, LIFC, F-25030 Besancon, France
[4] INRIA Lorraine, LORIA, Nancy, France
[5] Siemens AG, CT IC 3, D-8000 Munich, Germany
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
AVISPA is a push-button tool for the automated validation of Internet security-sensitive protocols and applications. It provides a modular and expressive formal language for specifying protocols and their security properties, and integrates different back-ends that implement a variety of state-of-the-art automatic analysis techniques. To the best of our knowledge, no other tool exhibits the same level of scope and robustness while enjoying the same performance and scalability.
引用
收藏
页码:281 / 285
页数:5
相关论文
共 50 条
  • [41] Review of Internet of Things security protocols - A Bibliometric Analysis
    Mwansa, Gardner
    Mabanza, Ntima
    2023 25TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, ICACT, 2023, : 394 - 400
  • [42] Security in the Internet of Things: A Survey on Application Layer Protocols
    Nastase, Lavinia
    2017 21ST INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS), 2017, : 659 - 666
  • [43] Network Externalities and the Deployment of Security Features and Protocols in the Internet
    Lelarge, Marc
    Bolot, Jean
    SIGMETRICS'08: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON MEASUREMENT & MODELING OF COMPUTER SYSTEMS, 2008, 36 (01): : 37 - +
  • [44] Analyzing the security flaws of internet key exchange protocols
    Zhang, Yong
    Feng, Dong-Lei
    Chen, Han-Sheng
    Bai, Ying-Cai
    Ruan Jian Xue Bao/Journal of Software, 2002, 13 (06): : 1173 - 1177
  • [45] A Security Evaluation of Popular Internet of Things Protocols for Manufacturers
    Celebucki, Daniel
    Lin, Maj Alan
    Graham, Scott
    2018 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2018,
  • [46] Internet of Things: Existing Protocols and Technological Challenges in Security
    Sardeshmukh, Harshal
    Ambawade, Dayanand
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
  • [47] Automated Design of Non-repudiation Security Protocols
    Xue, Haifeng
    Zhang, Huanguo
    Qing, Sihan
    Yu, Rongwei
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2318 - +
  • [48] On the automated correction of security protocols susceptible to a replay attack
    Juan, C. Lopez P.
    Monroy, Raul
    Hutter, Dieter
    COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 594 - +
  • [49] Automated security analysis techniques in MANET routing protocols
    Mao L.
    Huang Y.
    1600, Science Press (43): : 56 - 61
  • [50] Automated Verification of Timed Security Protocols with Clock Drift
    Li, Li
    Sun, Jun
    Dong, Jin Song
    FM 2016: FORMAL METHODS, 2016, 9995 : 513 - 530