DocumentCode
3054154
Title
Experimental Comparison of Automatic Tools for the Formal Analysis of Cryptographic Protocols
Author
Cheminod, M. ; Bertolotti, I. Cibrario ; Durante, L. ; Sisto, R. ; Valenzano, A.
Author_Institution
IEIIT-CNR, Turin
fYear
2007
fDate
14-16 June 2007
Firstpage
153
Lastpage
160
Abstract
The tools for cryptographic protocols analysis based on state exploration are designed to be completely automatic and should carry out their job with a limited amount of computing and storage resources, even when run by users having a limited amount of expertise in the field. This paper compares four tools of this kind to highlight their features and ability to detect bugs under the same experimental conditions. To this purpose, the ability of each tool to detect known flaws in a uniform set of well-known cryptographic protocols has been checked.
Keywords
cryptographic protocols; formal verification; automatic tool; cryptographic protocol; formal analysis; state exploration; Algebra; Calculus; Computer bugs; Cryptographic protocols; Job design; Performance analysis; Security; State-space methods; Storage automation; Testing;
fLanguage
English
Publisher
ieee
Conference_Titel
Dependability of Computer Systems, 2007. DepCoS-RELCOMEX '07. 2nd International Conference on
Conference_Location
Szklarska
Print_ISBN
0-7695-2850-3
Type
conf
DOI
10.1109/DEPCOS-RELCOMEX.2007.24
Filename
4272904
Link To Document