The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications

  • A. Armando
  • D. Basin
  • Y. Boichut
  • Y. Chevalier
  • L. Compagna
  • J. Cuellar
  • P. Hankes Drielsma
  • P. C. Heám
  • O. Kouchnarenko
  • J. Mantovani
  • S. Mödersheim
  • D. von Oheimb
  • M. Rusinowitch
  • J. Santiago
  • M. Turuani
  • L. Viganò
  • L. Vigneron
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3576)

Abstract

AVISPA is a push-button tool for the automated validation of Internet security-sensitive protocols and applications. It provides a modular and expressive formal language for specifying protocols and their security properties, and integrates different back-ends that implement a variety of state-of-the-art automatic analysis techniques. To the best of our knowledge, no other tool exhibits the same level of scope and robustness while enjoying the same performance and scalability.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Armando, A., Basin, D., Bouallagui, M., Chevalier, Y., Compagna, L., Mödersheim, S., Rusinowitch, M., Turuani, M., Viganò, L., Vigneron, L.: The AVISS Security Protocol Analysis Tool. In: Brinksma, E., Larsen, K.G. (eds.) CAV 2002. LNCS, vol. 2404, p. 349. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  2. 2.
    Armando, A., Compagna, L.: SATMC: a SAT-based Model Checker for Security Protocols. In: Alferes, J.J., Leite, J. (eds.) JELIA 2004. LNCS (LNAI), vol. 3229, pp. 730–733. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  3. 3.
    Basin, D., Mödersheim, S., Viganò, L.: OFMC: A Symbolic Model-Checker for Security Protocols. International Journal of Information Security (2004)Google Scholar
  4. 4.
    Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Proc. CSFW 2001. IEEE Computer Society Press, Los Alamitos (2001)Google Scholar
  5. 5.
    Boichut, Y., Heam, P.-C., Kouchnarenko, O., Oehl, F.: Improvements on the Genet and Klay Technique to Automatically Verify Security Protocols. In: Proc. AVIS 2004, ENTCS (2004) (to appear)Google Scholar
  6. 6.
    Bozga, L., Lakhnech, Y., Perin, M.: Hermes: An Automatic Tool for the Verification of Secrecy in Security Protocols. In: Hunt Jr., W.A., Somenzi, F. (eds.) CAV 2003. LNCS, vol. 2725, pp. 219–222. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  7. 7.
    The CAPSL Integrated Protocol Environment, http://www.csl.sri.com/~millen/
  8. 8.
    Chevalier, Y., Compagna, L., Cuellar, J., Hankes Drielsma, P., Mantovani, J., Mödersheim, S., Vigneron, L.: A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols. In: Proc. SAPS 2004. Austrian Computer Society (2004)Google Scholar
  9. 9.
    Chevalier, Y., Vigneron, L.: Automated Unbounded Verification of Security Protocols. In: Brinksma, E., Larsen, K.G. (eds.) CAV 2002. LNCS, vol. 2404, p. 324. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  10. 10.
    Clark, J., Jacob, J.: A Survey of Authentication Protocol Literature: Version 1.0, 17. November (1997), http://www.cs.york.ac.uk/~jac/papers/drareview.ps.gz
  11. 11.
    Heather, J., Lowe, G., Schneider, S.: How to prevent type flaw attacks on security protocols. In: Proc. CSFW 2000. IEEE Computer Society Press, Los Alamitos (2000)Google Scholar
  12. 12.
    Lamport, L.: The temporal logic of actions. ACM Transactions on Programming Languages and Systems 16(3), 872–923 (1994)CrossRefGoogle Scholar
  13. 13.
    Paulson, L.C.: The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security 6(1), 85–128 (1998)Google Scholar
  14. 14.
    Song, D.: Athena: A new efficient automatic checker for security protocol analysis. In: Proc. CSFW 1999. IEEE Computer Society Press, Los Alamitos (1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • A. Armando
    • 1
  • D. Basin
    • 2
  • Y. Boichut
    • 3
  • Y. Chevalier
    • 4
  • L. Compagna
    • 1
  • J. Cuellar
    • 5
  • P. Hankes Drielsma
    • 2
  • P. C. Heám
    • 3
  • O. Kouchnarenko
    • 3
  • J. Mantovani
    • 1
  • S. Mödersheim
    • 2
  • D. von Oheimb
    • 5
  • M. Rusinowitch
    • 4
  • J. Santiago
    • 4
  • M. Turuani
    • 4
  • L. Viganò
    • 2
  • L. Vigneron
    • 4
  1. 1.AI-Lab, DISTUniversità di GenovaItaly
  2. 2.Information Security GroupETH ZurichSwitzerland
  3. 3.LIFCUniversité de Franche-ComtéBesanconFrance
  4. 4.LORIA-INRIA-LorraineNancyFrance
  5. 5.Siemens AG, CT IC 3MunichGermany

Personalised recommendations