Boreale, Michele and Buscemi, Maria Grazia Experimenting with STA, a Tool for Automatic Analysis of Security Protocols. In: Proceedings of ACM Symposium in Applied Computing (SAC ’02). ACM Press, Madrid, pp. 281-285. ISBN 1-58113-445-2 (2002)
Full text not available from this repository.Abstract
We present STA (Symbolic Trace Analyzer). a tool for the analysis of security protocols. STA relies on symbolic techniques that avoid explicit construction of the whole, possibly infinite, state-space of protocols. This results in accurate protocol modeling, increased efficiency and mere direct formalization, when compared to finitestate techniques. We illustrate the use of STA by analyzing the well-known asymmetric Needham Schroeder protocol. We discuss the results of this analysis, and contrast them with previous work based on finite-state model checking.
Item Type: | Book Section |
---|---|
Identification Number: | https://doi.org/10.1145/508791.508847 |
Additional Information: | Primary Classification: C. Computer Systems Organization C.2 COMPUTER-COMMUNICATION NETWORKS C.2.2 Network Protocols Subjects: Protocol verification Additional Classification: D. Software D.4 OPERATING SYSTEMS D.4.6 Security and Protection |
Funders: | Research partly supported by the Italian MURST Project TOSCA (Teoria della Concorrenza, Linguaggi di Online Superiore e Strutture di Tipi). |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science Q Science > QA Mathematics > QA76 Computer software |
Research Area: | Computer Science and Applications |
Depositing User: | Users 29 not found. |
Date Deposited: | 01 Mar 2011 10:58 |
Last Modified: | 11 Jul 2011 14:33 |
URI: | http://eprints.imtlucca.it/id/eprint/133 |
Actions (login required)
Edit Item |