The tools for cryptographic protocols analysis based on state exploration are designed to be completely automatic and should carry out their job with a limited amount of computing and storage resources, even when run by users having a limited amount of expertise in the field. This paper compares four tools of this kind to highlight their features and ability to detect bugs under the same experimental conditions. To this purpose, the ability of each tool to detect known flaws in a uniform set of well-known cryptographic protocols has been checked.

Experimental Comparison of Automatic Tools for the Formal Analysis of Cryptographic Protocols

M Cheminod;I Cibrario Bertolotti;L Durante;R Sisto;A Valenzano
2007

Abstract

The tools for cryptographic protocols analysis based on state exploration are designed to be completely automatic and should carry out their job with a limited amount of computing and storage resources, even when run by users having a limited amount of expertise in the field. This paper compares four tools of this kind to highlight their features and ability to detect bugs under the same experimental conditions. To this purpose, the ability of each tool to detect known flaws in a uniform set of well-known cryptographic protocols has been checked.
2007
Istituto di Elettronica e di Ingegneria dell'Informazione e delle Telecomunicazioni - IEIIT
Inglese
2nd IEEE Int. Conference on Dependability of Computer Systems (DEPCOS-RELCOMEX ’07)
153
160
8
0-7695-2850-3
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4272904
IEEE-Institute Of Electrical And Electronics Engineers Inc.
Piscataway
STATI UNITI D'AMERICA
Sì, ma tipo non specificato
14-16 Giugno 2007
Szklarska Poreba
cryptographic protocols
automated tools
state exploration
performance evaluation
5
none
Cheminod, M; CIBRARIO BERTOLOTTI, Ivan; Durante, L; Sisto, R; Valenzano, A
273
info:eu-repo/semantics/conferenceObject
04 Contributo in convegno::04.01 Contributo in Atti di convegno
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/434425
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 3
  • ???jsp.display-item.citation.isi??? ND
social impact