• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 49
Next 10 →

Automated Security Protocol Analysis with the AVISPA Tool

by Luca Viganò - In Proceedings of MFPS’05 , 2006
"... The AVISPA Tool is a push-button tool for the Automated Validation of Internet Security Protocols and Applications. It provides a modular and expressive formal language for specifying protocols and their security properties, and integrates different back-ends that implement a variety of automatic pr ..."
Abstract - Cited by 28 (5 self) - Add to MetaCart
The AVISPA Tool is a push-button tool for the Automated Validation of Internet Security Protocols and Applications. It provides a modular and expressive formal language for specifying protocols and their security properties, and integrates different back-ends that implement a variety of automatic

Abstract Analysing Security Protocols with AVISPA

by unknown authors
"... Usage of the Internet has increased rapidly over the past decade. Increased amount of network users has also brought along a need of network-based services that require security. Developing new security protocols is a difficult task and sometimes too difficult task for human mind. We need an efficie ..."
Abstract - Add to MetaCart
an efficient tools to help the development and verification of the protocols. In this paper we introduce the protocol analysis tool called AVISPA. The paper describes the architecture of the tool and syntax for protocol specification language called HLPSL. We give an example of how a real protocol can

A Security Protocol Animator Tool for AVISPA

by Yann Glouche, Thomas Genet, Olivier Heen, Olivier Courtay - In ARTIST-2 workshop , 2006
"... Abstract. Avispa is now a commonly used verification tool for cryptographic protocols. The main advantage of this tool is the ability to use different verification techniques on the same protocol specification. In this paper, we present a protocol animator designed to help protocol developers in wri ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract. Avispa is now a commonly used verification tool for cryptographic protocols. The main advantage of this tool is the ability to use different verification techniques on the same protocol specification. In this paper, we present a protocol animator designed to help protocol developers

AVISPA: A Tool for Analyzing Software Process Models

by Julio A Hurtado Alegría , María Cecilia Bastarrica , Alexandre Bergel
"... SUMMARY Defining and formalizing the software development process is a common means for improving it. Software process modeling is often a challenging and expensive endeavor, since a well specified process may still include inefficiencies that are hardly detected before enacting it. Thus, assessing ..."
Abstract - Add to MetaCart
, assessing process quality is a relevant concern in order to improve several aspects such as conceptual integrity, correctness, usability, maintainability, and performance, among others. This paper describes AVISPA, a graphical tool that allows analyzing the quality of SPEM 2.0 software processes models

Analyzing the Scrum Process Model with AVISPA

by Julio Ariel, Marı́a Cecilia Bastarrica, Alexandre Bergel
"... Abstract—Scrum is a widely known agile software process model specifically designed for guiding non-technical activities in software development. This process is formally defined in EPF and adopted by several software companies around the world. But having a process definition does not necessarily m ..."
Abstract - Add to MetaCart
mean that it is well specified. We have developed AVISPA, a tool for localizing error patterns in software process models specified with EPF. In this paper, we analyze the public community specification of Scrum using AVISPA and we report our findings. I.

Formal Verification of Authenticated AODV Protocol using AVISPA

by Kinchit Vishesh, For I. T, Amandeep Verma
"... Due to the advancement in the communication technologies, people can communicate with each other anywhere on the move. The concept of ad hoc networks comes into existence in such scenarios. These networks require secure routing protocols; as such networks are vulnerable to various attacks, because o ..."
Abstract - Add to MetaCart
of their open and dynamic infrastructure. In this paper we analyze ad hoc on-demand distance vector routing protocol (AODV) using formal verification technique. The verification has been carried out with the help of an automated tool, AVISPA. The result reveals poor authentication between the nodes

The CASPA tool: Causality-based abstraction for security protocol analysis

by Michael Backes, Stefan Lorenz, Matteo Maffei, Kim Pecina - In Proceedings of the 20th international conference on Computer Aided Verification (CAV’08), Lecture Notes in Computer Science , 2008
"... Abstract. CASPA constitutes a push-button tool for automatically proving secrecy and authenticity properties of cryptographic protocols. The tool is grounded on a novel technique for causality-based abstraction of protocol executions that allows establishing proofs of security for an unbounded numbe ..."
Abstract - Cited by 5 (2 self) - Add to MetaCart
number of concurrent protocol executions in an automated manner. We demonstrate the expressiveness and efficiency of the tool by drawing a comparison with T4ASP, the static analyzer for secrecy properties offered by the AVISPA tool. CASPA is capable of coping with a substantially larger set of protocols

Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder

by Francis Klay, Laurent Vigneron - in "Formal Aspects in Security and Trust, 5th International Workshop, FAST 2008, Malaga, Spain, October 910, 2008, Revised Selected Papers
"... Abstract. Non-repudiation protocols have an important role in many areas where secured transactions with proofs of participation are necessary. Formal methods are clever and without error, therefore using them for verifying such protocols is crucial. In this purpose, we show how to partially represe ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
simple annotations in the protocol specification. It is very easy to implement in tools able to handle participants knowledge. We have implemented it in the AVISPA Tool and analyzed the Fair Zhou-Gollmann protocol and the optimistic Cederquist-Corin-Dashti protocol, discovering attacks in each

Model checking ad hoc network routing protocols: Aran vs. endaira

by Davide Benetti, Massimo Merro - In Proc. 8th IEEE International Conference on Software Engineering and Formal Methods, (SEFM’10 , 2010
"... Abstract—Several different secure routing protocols have been proposed for determining the appropriate paths on which data should be transmitted in ad hoc networks. In this paper, we focus on two of the most relevant such protocols, ARAN and endairA, and present the results of a formal analysis that ..."
Abstract - Cited by 8 (1 self) - Add to MetaCart
that we have carried out using the AVISPA Tool, an automated model checker for the analysis of security protocols. By model checking ARAN with the AVISPA Tool, we have discovered three attacks (a route disruption, a route diversion, and a creation of incorrect routing state), while our analysis of endair

(full paper) Automatic Methods for Analyzing Non-Repudiation Protocols with an Active Intruder

by Francis Klay, Laurent Vigneron
"... Abstract. Non-repudiation protocols have an important role in many areas where secured transactions with proofs of participation are necessary. Formal methods are clever and without error, therefore using them for verifying such protocols is crucial. In this purpose, we show how to partially represe ..."
Abstract - Add to MetaCart
simple annotations in the protocol specification. It is very easy to implement in tools able to handle participants knowledge. We have implemented it in the AVISPA Tool and analyzed the optimistic Cederquist-Corin-Dashti protocol, discovering two attacks. This extension of the AVISPA Tool for handling
Next 10 →
Results 1 - 10 of 49
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University