[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/11513988_27guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

The AVISPA tool for the automated validation of internet security protocols and applications

Published: 06 July 2005 Publication History

Abstract

AVISPA is a push-button tool for the automated validation of Internet security-sensitive protocols and applications. It provides a modular and expressive formal language for specifying protocols and their security properties, and integrates different back-ends that implement a variety of state-of-the-art automatic analysis techniques. To the best of our knowledge, no other tool exhibits the same level of scope and robustness while enjoying the same performance and scalability.

References

[1]
A. Armando, D. Basin, M. Bouallagui, Y. Chevalier, L. Compagna, S. Mödersheim, M. Rusinowitch, M. Turuani, L. Viganò, L. Vigneron. The AVISS Security Protocol Analysis Tool. In Proc. CAV'02, LNCS 2404. Springer, 2002.
[2]
A. Armando and L. Compagna. SATMC: a SAT-based Model Checker for Security Protocols. In Proc. JELIA'04, LNAI 3229. Springer, 2004.
[3]
D. Basin, S. Mödersheim, L. Viganò. OFMC: A Symbolic Model-Checker for Security Protocols. International Journal of Information Security, 2004.
[4]
B. Blanchet. An efficient cryptographic protocol verifier based on prolog rules. In Proc. CSFW'01. IEEE Computer Society Press, 2001.
[5]
Y. Boichut, P.-C. Heam, O. Kouchnarenko, F. Oehl. Improvements on the Genet and Klay Technique to Automatically Verify Security Protocols. In Proc. AVIS'04, ENTCS, to appear.
[6]
L. Bozga, Y. Lakhnech, M. Perin. Hermes: An Automatic Tool for the Verification of Secrecy in Security Protocols. In Proc. CAV'03, LNCS 2725. Springer, 2003.
[7]
The CAPSL Integrated Protocol Environment: www.csl.sri.com/~millen/.
[8]
Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, J. Mantovani, S. Mödersheim, L. Vigneron. A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols. In Proc. SAPS'04. Austrian Computer Society, 2004.
[9]
Y. Chevalier and L. Vigneron. Automated Unbounded Verification of Security Protocols. In Proc. CAV'02, LNCS 2404. Springer, 2002.
[10]
J. Clark and J. Jacob. A Survey of Authentication Protocol Literature: Version 1.0, 17. Nov. 1997. URL: www.cs.york.ac.uk/~jac/papers/drareview.ps.gz.
[11]
J. Heather, G. Lowe, S. Schneider. How to prevent type flaw attacks on security protocols. In Proc. CSFW'00. IEEE Computer Society Press, 2000.
[12]
L. Lamport. The temporal logic of actions. ACM Transactions on Programming Languages and Systems, 16(3):872-923, 1994.
[13]
L. C. Paulson. The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security, 6(1):85-128, 1998.
[14]
D. Song. Athena: A new efficient automatic checker for security protocol analysis. In Proc. CSFW'99. IEEE Computer Society Press, 1999.

Cited By

View all
  • (2024)An anonymous mutual authentication and key agreement scheme in WMSN using physiological dataWireless Networks10.1007/s11276-024-03690-930:4(2733-2752)Online publication date: 1-May-2024
  • (2024)Enhanced authentication and device integrity protection for GDOI using blockchainTransactions on Emerging Telecommunications Technologies10.1002/ett.498635:5Online publication date: 9-May-2024
  • (2023)Automated Security Analysis for Real-World IoT DevicesProceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy10.1145/3623652.3623667(29-37)Online publication date: 29-Oct-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
CAV'05: Proceedings of the 17th international conference on Computer Aided Verification
July 2005
564 pages
ISBN:3540272313

Sponsors

  • Jasper Design Automation: Jasper Design Automation
  • Weizmann Institute: Weizmann Institute
  • Microsoft: Microsoft
  • Intel: Intel
  • IBM: IBM

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 06 July 2005

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)An anonymous mutual authentication and key agreement scheme in WMSN using physiological dataWireless Networks10.1007/s11276-024-03690-930:4(2733-2752)Online publication date: 1-May-2024
  • (2024)Enhanced authentication and device integrity protection for GDOI using blockchainTransactions on Emerging Telecommunications Technologies10.1002/ett.498635:5Online publication date: 9-May-2024
  • (2023)Automated Security Analysis for Real-World IoT DevicesProceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy10.1145/3623652.3623667(29-37)Online publication date: 29-Oct-2023
  • (2023)Formally verifying security protocols built on watermarking and jammingComputers and Security10.1016/j.cose.2023.103133128:COnline publication date: 1-May-2023
  • (2023)A model-based approach for vulnerability analysis of IoT security protocolsComputers and Security10.1016/j.cose.2022.103037127:COnline publication date: 1-Apr-2023
  • (2023)New ECC-Based IoT Authentication Protocol for Securing RFID SystemsSN Computer Science10.1007/s42979-023-02220-24:6Online publication date: 12-Oct-2023
  • (2023)An Enhanced Anonymous ECC-Based Authentication for Lightweight Application in TMISCodes, Cryptology and Information Security10.1007/978-3-031-33017-9_19(290-320)Online publication date: 29-May-2023
  • (2022)A Blockchain-Based Secure Radio Frequency Identification Ownership Transfer ProtocolSecurity and Communication Networks10.1155/2022/93778182022Online publication date: 1-Jan-2022
  • (2022)ECC-Based Authenticated Key Exchange Protocol for Fog-Based IoT NetworksSecurity and Communication Networks10.1155/2022/72648032022Online publication date: 1-Jan-2022
  • (2022)Multifactor Authentication for Smart Emergency Medical Response TransportersInternational Journal of Telemedicine and Applications10.1155/2022/53949422022Online publication date: 1-Jan-2022
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media