TY - CHAP CY - Madrid AV - none TI - Experimenting with STA, a Tool for Automatic Analysis of Security Protocols Y1 - 2002/// UR - http://dx.doi.org/10.1145/508791.508847 A1 - Boreale, Michele A1 - Buscemi, Maria Grazia SN - 1-58113-445-2 PB - ACM Press N2 - We present STA (Symbolic Trace Analyzer). a tool for the analysis of security protocols. STA relies on symbolic techniques that avoid explicit construction of the whole, possibly infinite, state-space of protocols. This results in accurate protocol modeling, increased efficiency and mere direct formalization, when compared to finitestate techniques. We illustrate the use of STA by analyzing the well-known asymmetric Needham Schroeder protocol. We discuss the results of this analysis, and contrast them with previous work based on finite-state model checking. SP - 281 N1 - Primary Classification: C. Computer Systems Organization C.2 COMPUTER-COMMUNICATION NETWORKS C.2.2 Network Protocols Subjects: Protocol verification Additional Classification: D. Software D.4 OPERATING SYSTEMS D.4.6 Security and Protection ID - eprints133 EP - 285 T2 - Proceedings of ACM Symposium in Applied Computing (SAC ?02) ER -