Logo eprints

Experimenting with STA, a Tool for Automatic Analysis of Security Protocols

Boreale, Michele and Buscemi, Maria Grazia Experimenting with STA, a Tool for Automatic Analysis of Security Protocols. In: Proceedings of ACM Symposium in Applied Computing (SAC ’02). ACM Press, Madrid, pp. 281-285. ISBN 1-58113-445-2 (2002)

Full text not available from this repository.

Abstract

We present STA (Symbolic Trace Analyzer). a tool for the analysis of security protocols. STA relies on symbolic techniques that avoid explicit construction of the whole, possibly infinite, state-space of protocols. This results in accurate protocol modeling, increased efficiency and mere direct formalization, when compared to finitestate techniques. We illustrate the use of STA by analyzing the well-known asymmetric Needham Schroeder protocol. We discuss the results of this analysis, and contrast them with previous work based on finite-state model checking.

Item Type: Book Section
Identification Number: https://doi.org/10.1145/508791.508847
Additional Information: Primary Classification: C. Computer Systems Organization C.2 COMPUTER-COMMUNICATION NETWORKS C.2.2 Network Protocols Subjects: Protocol verification Additional Classification: D. Software D.4 OPERATING SYSTEMS D.4.6 Security and Protection
Funders: Research partly supported by the Italian MURST Project TOSCA (Teoria della Concorrenza, Linguaggi di Online Superiore e Strutture di Tipi).
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Q Science > QA Mathematics > QA76 Computer software
Research Area: Computer Science and Applications
Depositing User: Users 29 not found.
Date Deposited: 01 Mar 2011 10:58
Last Modified: 11 Jul 2011 14:33
URI: http://eprints.imtlucca.it/id/eprint/133

Actions (login required)

Edit Item Edit Item