TY - CHAP N2 - We present STA (Symbolic Trace Analyzer). a tool for the analysis of security protocols. STA relies on symbolic techniques that avoid explicit construction of the whole, possibly infinite, state-space of protocols. This results in accurate protocol modeling, increased efficiency and mere direct formalization, when compared to finitestate techniques. We illustrate the use of STA by analyzing the well-known asymmetric Needham Schroeder protocol. We discuss the results of this analysis, and contrast them with previous work based on finite-state model checking. CY - Madrid TI - Experimenting with STA, a Tool for Automatic Analysis of Security Protocols N1 - Primary Classification: C. Computer Systems Organization C.2 COMPUTER-COMMUNICATION NETWORKS C.2.2 Network Protocols Subjects: Protocol verification Additional Classification: D. Software D.4 OPERATING SYSTEMS D.4.6 Security and Protection A1 - Boreale, Michele A1 - Buscemi, Maria Grazia Y1 - 2002/// UR - http://dx.doi.org/10.1145/508791.508847 EP - 285 PB - ACM Press AV - none T2 - Proceedings of ACM Symposium in Applied Computing (SAC ?02) SN - 1-58113-445-2 SP - 281 ID - eprints133 ER -