%0 Book Section %A Boreale, Michele %A Buscemi, Maria Grazia %B Proceedings of ACM Symposium in Applied Computing (SAC ’02) %C Madrid %D 2002 %F eprints:133 %I ACM Press %P 281-285 %T Experimenting with STA, a Tool for Automatic Analysis of Security Protocols %U http://eprints.imtlucca.it/133/ %X We present STA (Symbolic Trace Analyzer). a tool for the analysis of security protocols. STA relies on symbolic techniques that avoid explicit construction of the whole, possibly infinite, state-space of protocols. This results in accurate protocol modeling, increased efficiency and mere direct formalization, when compared to finitestate techniques. We illustrate the use of STA by analyzing the well-known asymmetric Needham Schroeder protocol. We discuss the results of this analysis, and contrast them with previous work based on finite-state model checking. %Z Primary Classification: C. Computer Systems Organization C.2 COMPUTER-COMMUNICATION NETWORKS C.2.2 Network Protocols Subjects: Protocol verification Additional Classification: D. Software D.4 OPERATING SYSTEMS D.4.6 Security and Protection