2005
DOI: 10.1007/11513988_27
|View full text |Cite
|
Sign up to set email alerts
|

The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications

Abstract: AVISPA is a pushbutton tool for the automated validation of Internet security-sensitive protocols and applications. It provides a modular and expressive formal language for specifying protocols and their security properties, and integrates different back-ends that implement a variety of state-of-the-art automatic analysis techniques. To the best of our knowledge, no other tool exhibits the same level of scope and robustness while enjoying the same performance and scalability.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

2
677
0
1

Year Published

2007
2007
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 985 publications
(680 citation statements)
references
References 9 publications
2
677
0
1
Order By: Relevance
“…In this paper, we have validated the security properties of SNEP by modeling the protocol using Automated Validation of Internet Security Protocols and Applications (AVISPA) [10]. AVISPA is a push-button tool with industrial-strength technology for the analysis of different Internet security protocols and applications.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, we have validated the security properties of SNEP by modeling the protocol using Automated Validation of Internet Security Protocols and Applications (AVISPA) [10]. AVISPA is a push-button tool with industrial-strength technology for the analysis of different Internet security protocols and applications.…”
Section: Introductionmentioning
confidence: 99%
“…Over the last decades many automatic tools based on formal analysis techniques have been presented for verifying cryptographic protocols [2,8,11,14,18,29,31,33,40,20]. All these tools use the so-called Dolev-Yao intruder model.…”
Section: Introductionmentioning
confidence: 99%
“…In [4], a large set of protocols is verified using the AVISS tool and timing results are given. In [45], a similar test is performed using the successor of AVISS, called the Avispa tool suite [2]. As the AVISS/Avispa tools consist of respectively three and four back-end tools, these tests effectively work as a comparison between the back end tools.…”
Section: Introductionmentioning
confidence: 99%
“…In this section we recall the syntax and the semantics of the shared-key spi-calculus, following [9]. 3 Syntax We assume an infinite set of names N , ranging from a, b, c, . .…”
Section: Spi Calculusmentioning
confidence: 99%
“…; see e.g. [16,10,3,6]. Actually, both approaches have strong and weak points: automatic tools are quite successful on particular finite-state systems, but they naturally suffer of state-explosion problems and usually cannot be used for proving general properties.…”
Section: Introductionmentioning
confidence: 99%