The AVISS Security Protocol Analysis Tool
Identifieur interne : 002504 ( Istex/Corpus ); précédent : 002503; suivant : 002505The AVISS Security Protocol Analysis Tool
Auteurs : Alessandro Armando ; David Basin ; Mehdi Bouallagui ; Yannick Chevalier ; Luca Compagna ; Sebastian Mödersheim ; Michael Rusinowitch ; Mathieu Turuani ; Luca Vigan ; Laurent VigneronSource :
- Lecture Notes in Computer Science [ 0302-9743 ]
Abstract
Abstract: We introduce AVISS, a tool for security protocol analysis that supports the integration of back-ends implementing different search techniques, allowing for their systematic and quantitative comparison and paving the way to their effective interaction. As a significant example, we have implemented three back-ends, and used the AVISS tool to analyze and find flaws in 36 protocols, including 31 problems in the Clark-Jacob’s protocol library and a previously unreported flaw in the Denning-Sacco protocol.
Url:
DOI: 10.1007/3-540-45657-0_27
Links to Exploration step
ISTEX:9DFCCDE838AB8BE098C6BA03ABFA04E8C0E8E987Le document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title xml:lang="en">The AVISS Security Protocol Analysis Tool</title>
<author><name sortKey="Armando, Alessandro" sort="Armando, Alessandro" uniqKey="Armando A" first="Alessandro" last="Armando">Alessandro Armando</name>
<affiliation><mods:affiliation>Mechanized Reasoning Group, DIST Università di Genova, Italy</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Basin, David" sort="Basin, David" uniqKey="Basin D" first="David" last="Basin">David Basin</name>
<affiliation><mods:affiliation>Institut für Informatik, Universität Freiburg, Germany</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Bouallagui, Mehdi" sort="Bouallagui, Mehdi" uniqKey="Bouallagui M" first="Mehdi" last="Bouallagui">Mehdi Bouallagui</name>
<affiliation><mods:affiliation>LORIA-INRIA-Lorraine, Nancy, France</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Chevalier, Yannick" sort="Chevalier, Yannick" uniqKey="Chevalier Y" first="Yannick" last="Chevalier">Yannick Chevalier</name>
<affiliation><mods:affiliation>LORIA-INRIA-Lorraine, Nancy, France</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Compagna, Luca" sort="Compagna, Luca" uniqKey="Compagna L" first="Luca" last="Compagna">Luca Compagna</name>
<affiliation><mods:affiliation>Mechanized Reasoning Group, DIST Università di Genova, Italy</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Modersheim, Sebastian" sort="Modersheim, Sebastian" uniqKey="Modersheim S" first="Sebastian" last="Mödersheim">Sebastian Mödersheim</name>
<affiliation><mods:affiliation>Institut für Informatik, Universität Freiburg, Germany</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Rusinowitch, Michael" sort="Rusinowitch, Michael" uniqKey="Rusinowitch M" first="Michael" last="Rusinowitch">Michael Rusinowitch</name>
<affiliation><mods:affiliation>LORIA-INRIA-Lorraine, Nancy, France</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Turuani, Mathieu" sort="Turuani, Mathieu" uniqKey="Turuani M" first="Mathieu" last="Turuani">Mathieu Turuani</name>
<affiliation><mods:affiliation>LORIA-INRIA-Lorraine, Nancy, France</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Vigan, Luca" sort="Vigan, Luca" uniqKey="Vigan L" first="Luca" last="Vigan">Luca Vigan</name>
<affiliation><mods:affiliation>Institut für Informatik, Universität Freiburg, Germany</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Vigneron, Laurent" sort="Vigneron, Laurent" uniqKey="Vigneron L" first="Laurent" last="Vigneron">Laurent Vigneron</name>
<affiliation><mods:affiliation>LORIA-INRIA-Lorraine, Nancy, France</mods:affiliation>
</affiliation>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:9DFCCDE838AB8BE098C6BA03ABFA04E8C0E8E987</idno>
<date when="2002" year="2002">2002</date>
<idno type="doi">10.1007/3-540-45657-0_27</idno>
<idno type="url">https://api.istex.fr/ark:/67375/HCB-9WBPRPG0-H/fulltext.pdf</idno>
<idno type="wicri:Area/Istex/Corpus">002504</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">002504</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a" type="main" xml:lang="en">The AVISS Security Protocol Analysis Tool</title>
<author><name sortKey="Armando, Alessandro" sort="Armando, Alessandro" uniqKey="Armando A" first="Alessandro" last="Armando">Alessandro Armando</name>
<affiliation><mods:affiliation>Mechanized Reasoning Group, DIST Università di Genova, Italy</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Basin, David" sort="Basin, David" uniqKey="Basin D" first="David" last="Basin">David Basin</name>
<affiliation><mods:affiliation>Institut für Informatik, Universität Freiburg, Germany</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Bouallagui, Mehdi" sort="Bouallagui, Mehdi" uniqKey="Bouallagui M" first="Mehdi" last="Bouallagui">Mehdi Bouallagui</name>
<affiliation><mods:affiliation>LORIA-INRIA-Lorraine, Nancy, France</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Chevalier, Yannick" sort="Chevalier, Yannick" uniqKey="Chevalier Y" first="Yannick" last="Chevalier">Yannick Chevalier</name>
<affiliation><mods:affiliation>LORIA-INRIA-Lorraine, Nancy, France</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Compagna, Luca" sort="Compagna, Luca" uniqKey="Compagna L" first="Luca" last="Compagna">Luca Compagna</name>
<affiliation><mods:affiliation>Mechanized Reasoning Group, DIST Università di Genova, Italy</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Modersheim, Sebastian" sort="Modersheim, Sebastian" uniqKey="Modersheim S" first="Sebastian" last="Mödersheim">Sebastian Mödersheim</name>
<affiliation><mods:affiliation>Institut für Informatik, Universität Freiburg, Germany</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Rusinowitch, Michael" sort="Rusinowitch, Michael" uniqKey="Rusinowitch M" first="Michael" last="Rusinowitch">Michael Rusinowitch</name>
<affiliation><mods:affiliation>LORIA-INRIA-Lorraine, Nancy, France</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Turuani, Mathieu" sort="Turuani, Mathieu" uniqKey="Turuani M" first="Mathieu" last="Turuani">Mathieu Turuani</name>
<affiliation><mods:affiliation>LORIA-INRIA-Lorraine, Nancy, France</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Vigan, Luca" sort="Vigan, Luca" uniqKey="Vigan L" first="Luca" last="Vigan">Luca Vigan</name>
<affiliation><mods:affiliation>Institut für Informatik, Universität Freiburg, Germany</mods:affiliation>
</affiliation>
</author>
<author><name sortKey="Vigneron, Laurent" sort="Vigneron, Laurent" uniqKey="Vigneron L" first="Laurent" last="Vigneron">Laurent Vigneron</name>
<affiliation><mods:affiliation>LORIA-INRIA-Lorraine, Nancy, France</mods:affiliation>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="s" type="main" xml:lang="en">Lecture Notes in Computer Science</title>
<idno type="ISSN">0302-9743</idno>
<idno type="ISSN">0302-9743</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt><idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass></textClass>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">Abstract: We introduce AVISS, a tool for security protocol analysis that supports the integration of back-ends implementing different search techniques, allowing for their systematic and quantitative comparison and paving the way to their effective interaction. As a significant example, we have implemented three back-ends, and used the AVISS tool to analyze and find flaws in 36 protocols, including 31 problems in the Clark-Jacob’s protocol library and a previously unreported flaw in the Denning-Sacco protocol.</div>
</front>
</TEI>
<istex><corpusName>springer-ebooks</corpusName>
<author><json:item><name>Alessandro Armando</name>
<affiliations><json:string>Mechanized Reasoning Group, DIST Università di Genova, Italy</json:string>
</affiliations>
</json:item>
<json:item><name>David Basin</name>
<affiliations><json:string>Institut für Informatik, Universität Freiburg, Germany</json:string>
</affiliations>
</json:item>
<json:item><name>Mehdi Bouallagui</name>
<affiliations><json:string>LORIA-INRIA-Lorraine, Nancy, France</json:string>
</affiliations>
</json:item>
<json:item><name>Yannick Chevalier</name>
<affiliations><json:string>LORIA-INRIA-Lorraine, Nancy, France</json:string>
</affiliations>
</json:item>
<json:item><name>Luca Compagna</name>
<affiliations><json:string>Mechanized Reasoning Group, DIST Università di Genova, Italy</json:string>
</affiliations>
</json:item>
<json:item><name>Sebastian Mödersheim</name>
<affiliations><json:string>Institut für Informatik, Universität Freiburg, Germany</json:string>
</affiliations>
</json:item>
<json:item><name>Michael Rusinowitch</name>
<affiliations><json:string>LORIA-INRIA-Lorraine, Nancy, France</json:string>
</affiliations>
</json:item>
<json:item><name>Mathieu Turuani</name>
<affiliations><json:string>LORIA-INRIA-Lorraine, Nancy, France</json:string>
</affiliations>
</json:item>
<json:item><name>Luca Viganò</name>
<affiliations><json:string>Institut für Informatik, Universität Freiburg, Germany</json:string>
</affiliations>
</json:item>
<json:item><name>Laurent Vigneron</name>
<affiliations><json:string>LORIA-INRIA-Lorraine, Nancy, France</json:string>
</affiliations>
</json:item>
</author>
<arkIstex>ark:/67375/HCB-9WBPRPG0-H</arkIstex>
<language><json:string>eng</json:string>
</language>
<originalGenre><json:string>OriginalPaper</json:string>
</originalGenre>
<abstract>Abstract: We introduce AVISS, a tool for security protocol analysis that supports the integration of back-ends implementing different search techniques, allowing for their systematic and quantitative comparison and paving the way to their effective interaction. As a significant example, we have implemented three back-ends, and used the AVISS tool to analyze and find flaws in 36 protocols, including 31 problems in the Clark-Jacob’s protocol library and a previously unreported flaw in the Denning-Sacco protocol.</abstract>
<qualityIndicators><score>4.666</score>
<pdfWordCount>1778</pdfWordCount>
<pdfCharCount>11571</pdfCharCount>
<pdfVersion>1.3</pdfVersion>
<pdfPageCount>6</pdfPageCount>
<pdfPageSize>451 x 677.12 pts</pdfPageSize>
<refBibsNative>false</refBibsNative>
<abstractWordCount>74</abstractWordCount>
<abstractCharCount>515</abstractCharCount>
<keywordCount>0</keywordCount>
</qualityIndicators>
<title>The AVISS Security Protocol Analysis Tool</title>
<chapterId><json:string>27</json:string>
<json:string>Chap27</json:string>
</chapterId>
<genre><json:string>conference</json:string>
</genre>
<serie><title>Lecture Notes in Computer Science</title>
<language><json:string>unknown</json:string>
</language>
<copyrightDate>2002</copyrightDate>
<issn><json:string>0302-9743</json:string>
</issn>
<editor><json:item><name>Gerhard Goos</name>
<affiliations><json:string>Karlsruhe University, Germany</json:string>
</affiliations>
</json:item>
<json:item><name>Juris Hartmanis</name>
<affiliations><json:string>Cornell University, NY, USA</json:string>
</affiliations>
</json:item>
<json:item><name>Jan van Leeuwen</name>
<affiliations><json:string>Utrecht University, The Netherlands</json:string>
</affiliations>
</json:item>
</editor>
</serie>
<host><title>Computer Aided Verification</title>
<language><json:string>unknown</json:string>
</language>
<copyrightDate>2002</copyrightDate>
<doi><json:string>10.1007/3-540-45657-0</json:string>
</doi>
<issn><json:string>0302-9743</json:string>
</issn>
<eisbn><json:string>978-3-540-45657-5</json:string>
</eisbn>
<bookId><json:string>3-540-45657-0</json:string>
</bookId>
<isbn><json:string>978-3-540-43997-4</json:string>
</isbn>
<volume>2404</volume>
<pages><first>349</first>
<last>354</last>
</pages>
<genre><json:string>book-series</json:string>
</genre>
<editor><json:item><name>Ed Brinksma</name>
<affiliations><json:string>Department of Computer Science, University of Twente, P. O. Box 217, 7500 AE, Enschede, The Netherlands</json:string>
<json:string>E-mail: brinksma@cs.utwente.nl</json:string>
</affiliations>
</json:item>
<json:item><name>Kim Guldstrand Larsen</name>
<affiliations><json:string>Department of Computer Science, Aalborg University, Fredrik Bajers Vej 7, 9220, Aalborg Ø, Denmark</json:string>
<json:string>E-mail: kgl@cs.auc.dk</json:string>
</affiliations>
</json:item>
</editor>
<subject><json:item><value>Computer Science</value>
</json:item>
<json:item><value>Computer Science</value>
</json:item>
<json:item><value>Logics and Meanings of Programs</value>
</json:item>
<json:item><value>Software Engineering</value>
</json:item>
<json:item><value>Mathematical Logic and Formal Languages</value>
</json:item>
<json:item><value>Artificial Intelligence (incl. Robotics)</value>
</json:item>
<json:item><value>Special Purpose and Application-Based Systems</value>
</json:item>
</subject>
</host>
<ark><json:string>ark:/67375/HCB-9WBPRPG0-H</json:string>
</ark>
<publicationDate>2002</publicationDate>
<copyrightDate>2002</copyrightDate>
<doi><json:string>10.1007/3-540-45657-0_27</json:string>
</doi>
<id>9DFCCDE838AB8BE098C6BA03ABFA04E8C0E8E987</id>
<score>1</score>
<fulltext><json:item><extension>pdf</extension>
<original>true</original>
<mimetype>application/pdf</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-9WBPRPG0-H/fulltext.pdf</uri>
</json:item>
<json:item><extension>zip</extension>
<original>false</original>
<mimetype>application/zip</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-9WBPRPG0-H/bundle.zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/ark:/67375/HCB-9WBPRPG0-H/fulltext.tei"><teiHeader><fileDesc><titleStmt><title level="a" type="main" xml:lang="en">The AVISS Security Protocol Analysis Tool</title>
</titleStmt>
<publicationStmt><authority>ISTEX</authority>
<availability><licence>Springer-Verlag Berlin Heidelberg</licence>
</availability>
<date when="2002">2002</date>
</publicationStmt>
<notesStmt><note type="conference" source="proceedings" scheme="https://content-type.data.istex.fr/ark:/67375/XTP-BFHXPBJJ-3">conference</note>
<note type="publication-type" subtype="book-series" scheme="https://publication-type.data.istex.fr/ark:/67375/JMC-0G6R5W5T-Z">book-series</note>
</notesStmt>
<sourceDesc><biblStruct><analytic><title level="a" type="main" xml:lang="en">The AVISS Security Protocol Analysis Tool</title>
<author><persName><forename type="first">Alessandro</forename>
<surname>Armando</surname>
</persName>
<affiliation><orgName type="department">Mechanized Reasoning Group</orgName>
<orgName type="institution">DIST Università di Genova</orgName>
<address><country key="IT">ITALY</country>
</address>
</affiliation>
</author>
<author><persName><forename type="first">David</forename>
<surname>Basin</surname>
</persName>
<affiliation><orgName type="department">Institut für Informatik</orgName>
<orgName type="institution">Universität Freiburg</orgName>
<address><country key="DE">GERMANY</country>
</address>
</affiliation>
</author>
<author><persName><forename type="first">Mehdi</forename>
<surname>Bouallagui</surname>
</persName>
<affiliation><orgName type="institution">LORIA-INRIA-Lorraine</orgName>
<address><settlement>Nancy</settlement>
<country key="FR">FRANCE</country>
</address>
</affiliation>
</author>
<author><persName><forename type="first">Yannick</forename>
<surname>Chevalier</surname>
</persName>
<affiliation><orgName type="institution">LORIA-INRIA-Lorraine</orgName>
<address><settlement>Nancy</settlement>
<country key="FR">FRANCE</country>
</address>
</affiliation>
</author>
<author><persName><forename type="first">Luca</forename>
<surname>Compagna</surname>
</persName>
<affiliation><orgName type="department">Mechanized Reasoning Group</orgName>
<orgName type="institution">DIST Università di Genova</orgName>
<address><country key="IT">ITALY</country>
</address>
</affiliation>
</author>
<author><persName><forename type="first">Sebastian</forename>
<surname>Mödersheim</surname>
</persName>
<affiliation><orgName type="department">Institut für Informatik</orgName>
<orgName type="institution">Universität Freiburg</orgName>
<address><country key="DE">GERMANY</country>
</address>
</affiliation>
</author>
<author><persName><forename type="first">Michael</forename>
<surname>Rusinowitch</surname>
</persName>
<affiliation><orgName type="institution">LORIA-INRIA-Lorraine</orgName>
<address><settlement>Nancy</settlement>
<country key="FR">FRANCE</country>
</address>
</affiliation>
</author>
<author><persName><forename type="first">Mathieu</forename>
<surname>Turuani</surname>
</persName>
<affiliation><orgName type="institution">LORIA-INRIA-Lorraine</orgName>
<address><settlement>Nancy</settlement>
<country key="FR">FRANCE</country>
</address>
</affiliation>
</author>
<author><persName><forename type="first">Luca</forename>
<surname>Viganò</surname>
</persName>
<affiliation><orgName type="department">Institut für Informatik</orgName>
<orgName type="institution">Universität Freiburg</orgName>
<address><country key="DE">GERMANY</country>
</address>
</affiliation>
</author>
<author><persName><forename type="first">Laurent</forename>
<surname>Vigneron</surname>
</persName>
<affiliation><orgName type="institution">LORIA-INRIA-Lorraine</orgName>
<address><settlement>Nancy</settlement>
<country key="FR">FRANCE</country>
</address>
</affiliation>
</author>
<idno type="istex">9DFCCDE838AB8BE098C6BA03ABFA04E8C0E8E987</idno>
<idno type="ark">ark:/67375/HCB-9WBPRPG0-H</idno>
<idno type="DOI">10.1007/3-540-45657-0_27</idno>
</analytic>
<monogr><title level="m" type="main">Computer Aided Verification</title>
<title level="m" type="sub">14th International Conference, CAV 2002 Copenhagen, Denmark, July 27–31, 2002 Proceedings</title>
<title level="m" type="part">Tool Presentations</title>
<idno type="DOI">10.1007/3-540-45657-0</idno>
<idno type="book-id">3-540-45657-0</idno>
<idno type="ISBN">978-3-540-43997-4</idno>
<idno type="eISBN">978-3-540-45657-5</idno>
<idno type="chapter-id">Chap27</idno>
<idno type="part-id">Part9</idno>
<editor><persName><forename type="first">Ed</forename>
<surname>Brinksma</surname>
</persName>
<email>brinksma@cs.utwente.nl</email>
<affiliation><orgName type="department">Department of Computer Science</orgName>
<orgName type="institution">University of Twente</orgName>
<address><postBox>P. O. Box 217</postBox>
<postCode>7500 AE</postCode>
<settlement>Enschede</settlement>
<country key=""></country>
</address>
</affiliation>
</editor>
<editor><persName><forename type="first">Kim</forename>
<forename type="first">Guldstrand</forename>
<surname>Larsen</surname>
</persName>
<email>kgl@cs.auc.dk</email>
<affiliation><orgName type="department">Department of Computer Science</orgName>
<orgName type="institution">Aalborg University</orgName>
<address><street>Fredrik Bajers Vej 7</street>
<postCode>9220</postCode>
<settlement>Aalborg Ø</settlement>
<country key="DK">DENMARK</country>
</address>
</affiliation>
</editor>
<imprint><biblScope unit="vol">2404</biblScope>
<biblScope unit="page" from="349">349</biblScope>
<biblScope unit="page" to="354">354</biblScope>
<biblScope unit="chapter-count">51</biblScope>
<biblScope unit="part-chapter-count">6</biblScope>
</imprint>
</monogr>
<series><title level="s" type="main" xml:lang="en">Lecture Notes in Computer Science</title>
<editor><persName><forename type="first">Gerhard</forename>
<surname>Goos</surname>
</persName>
<affiliation><orgName type="institution">Karlsruhe University</orgName>
<address><country key="DE">GERMANY</country>
</address>
</affiliation>
</editor>
<editor><persName><forename type="first">Juris</forename>
<surname>Hartmanis</surname>
</persName>
<affiliation><orgName type="institution">Cornell University</orgName>
<address><region>NY</region>
<country key="US">UNITED STATES</country>
</address>
</affiliation>
</editor>
<editor><persName><forename type="first">Jan</forename>
<nameLink>van</nameLink>
<surname>Leeuwen</surname>
</persName>
<affiliation><orgName type="institution">Utrecht University</orgName>
<address><country key=""></country>
</address>
</affiliation>
</editor>
<idno type="pISSN">0302-9743</idno>
<idno type="seriesID">558</idno>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc><abstract xml:lang="en"><head>Abstract</head>
<p>We introduce AVISS, a tool for security protocol analysis that supports the integration of back-ends implementing different search techniques, allowing for their systematic and quantitative comparison and paving the way to their effective interaction. As a significant example, we have implemented three back-ends, and used the AVISS tool to analyze and find flaws in 36 protocols, including 31 problems in the Clark-Jacob’s protocol library and a previously unreported flaw in the Denning-Sacco protocol.</p>
</abstract>
<textClass ana="subject"><keywords scheme="book-subject-collection"><list><label>SUCO11645</label>
<item><term>Computer Science</term>
</item>
</list>
</keywords>
</textClass>
<textClass ana="subject"><keywords scheme="book-subject"><list><label>I</label>
<item><term type="Primary">Computer Science</term>
</item>
<label>I1603X</label>
<item><term type="Secondary" subtype="priority-1">Logics and Meanings of Programs</term>
</item>
<label>I14029</label>
<item><term type="Secondary" subtype="priority-2">Software Engineering</term>
</item>
<label>I16048</label>
<item><term type="Secondary" subtype="priority-3">Mathematical Logic and Formal Languages</term>
</item>
<label>I21017</label>
<item><term type="Secondary" subtype="priority-4">Artificial Intelligence (incl. Robotics)</term>
</item>
<label>I13030</label>
<item><term type="Secondary" subtype="priority-5">Special Purpose and Application-Based Systems</term>
</item>
</list>
</keywords>
</textClass>
<langUsage><language ident="EN"></language>
</langUsage>
</profileDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item><extension>txt</extension>
<original>false</original>
<mimetype>text/plain</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-9WBPRPG0-H/fulltext.txt</uri>
</json:item>
</fulltext>
<metadata><istex:metadataXml wicri:clean="corpus springer-ebooks not found" wicri:toSee="no header"><istex:xmlDeclaration>version="1.0" encoding="UTF-8"</istex:xmlDeclaration>
<istex:docType PUBLIC="-//Springer-Verlag//DTD A++ V2.4//EN" URI="http://devel.springer.de/A++/V2.4/DTD/A++V2.4.dtd" name="istex:docType"></istex:docType>
<istex:document><Publisher><PublisherInfo><PublisherName>Springer Berlin Heidelberg</PublisherName>
<PublisherLocation>Berlin, Heidelberg</PublisherLocation>
</PublisherInfo>
<Series><SeriesInfo SeriesType="Series" TocLevels="0"><SeriesID>558</SeriesID>
<SeriesPrintISSN>0302-9743</SeriesPrintISSN>
<SeriesTitle Language="En">Lecture Notes in Computer Science</SeriesTitle>
</SeriesInfo>
<SeriesHeader><EditorGroup><Editor AffiliationIDS="Aff1"><EditorName DisplayOrder="Western"><GivenName>Gerhard</GivenName>
<FamilyName>Goos</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff2"><EditorName DisplayOrder="Western"><GivenName>Juris</GivenName>
<FamilyName>Hartmanis</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff3"><EditorName DisplayOrder="Western"><GivenName>Jan</GivenName>
<Particle>van</Particle>
<FamilyName>Leeuwen</FamilyName>
</EditorName>
</Editor>
<Affiliation ID="Aff1"><OrgName>Karlsruhe University</OrgName>
<OrgAddress><Country>Germany</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff2"><OrgName>Cornell University</OrgName>
<OrgAddress><State>NY</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff3"><OrgName>Utrecht University</OrgName>
<OrgAddress><Country>The Netherlands</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</SeriesHeader>
<Book Language="En"><BookInfo BookProductType="Proceedings" Language="En" MediaType="eBook" NumberingStyle="Unnumbered" TocLevels="0"><BookID>3-540-45657-0</BookID>
<BookTitle>Computer Aided Verification</BookTitle>
<BookSubTitle>14th International Conference, CAV 2002 Copenhagen, Denmark, July 27–31, 2002 Proceedings</BookSubTitle>
<BookVolumeNumber>2404</BookVolumeNumber>
<BookSequenceNumber>2404</BookSequenceNumber>
<BookDOI>10.1007/3-540-45657-0</BookDOI>
<BookTitleID>72662</BookTitleID>
<BookPrintISBN>978-3-540-43997-4</BookPrintISBN>
<BookElectronicISBN>978-3-540-45657-5</BookElectronicISBN>
<BookChapterCount>51</BookChapterCount>
<BookHistory><OnlineDate><Year>2002</Year>
<Month>9</Month>
<Day>20</Day>
</OnlineDate>
</BookHistory>
<BookCopyright><CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2002</CopyrightYear>
</BookCopyright>
<BookSubjectGroup><BookSubject Code="I" Type="Primary">Computer Science</BookSubject>
<BookSubject Code="I1603X" Priority="1" Type="Secondary">Logics and Meanings of Programs</BookSubject>
<BookSubject Code="I14029" Priority="2" Type="Secondary">Software Engineering</BookSubject>
<BookSubject Code="I16048" Priority="3" Type="Secondary">Mathematical Logic and Formal Languages</BookSubject>
<BookSubject Code="I21017" Priority="4" Type="Secondary">Artificial Intelligence (incl. Robotics)</BookSubject>
<BookSubject Code="I13030" Priority="5" Type="Secondary">Special Purpose and Application-Based Systems</BookSubject>
<SubjectCollection Code="SUCO11645">Computer Science</SubjectCollection>
</BookSubjectGroup>
<BookContext><SeriesID>558</SeriesID>
</BookContext>
</BookInfo>
<BookHeader><EditorGroup><Editor AffiliationIDS="Aff4"><EditorName DisplayOrder="Western"><GivenName>Ed</GivenName>
<FamilyName>Brinksma</FamilyName>
</EditorName>
<Contact><Email>brinksma@cs.utwente.nl</Email>
</Contact>
</Editor>
<Editor AffiliationIDS="Aff5"><EditorName DisplayOrder="Western"><GivenName>Kim</GivenName>
<GivenName>Guldstrand</GivenName>
<FamilyName>Larsen</FamilyName>
</EditorName>
<Contact><Email>kgl@cs.auc.dk</Email>
</Contact>
</Editor>
<Affiliation ID="Aff4"><OrgDivision>Department of Computer Science</OrgDivision>
<OrgName>University of Twente</OrgName>
<OrgAddress><Postbox>P. O. Box 217</Postbox>
<Postcode>7500 AE</Postcode>
<City>Enschede</City>
<Country>The Netherlands</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff5"><OrgDivision>Department of Computer Science</OrgDivision>
<OrgName>Aalborg University</OrgName>
<OrgAddress><Street>Fredrik Bajers Vej 7</Street>
<Postcode>9220</Postcode>
<City>Aalborg Ø</City>
<Country>Denmark</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</BookHeader>
<Part ID="Part9"><PartInfo TocLevels="0"><PartID>9</PartID>
<PartSequenceNumber>9</PartSequenceNumber>
<PartTitle>Tool Presentations</PartTitle>
<PartChapterCount>6</PartChapterCount>
<PartContext><SeriesID>558</SeriesID>
<BookID>3-540-45657-0</BookID>
<BookTitle>Computer Aided Verification</BookTitle>
</PartContext>
</PartInfo>
<Chapter ID="Chap27" Language="En"><ChapterInfo ChapterType="OriginalPaper" ContainsESM="No" Language="En" NumberingStyle="Unnumbered" TocLevels="0"><ChapterID>27</ChapterID>
<ChapterDOI>10.1007/3-540-45657-0_27</ChapterDOI>
<ChapterSequenceNumber>27</ChapterSequenceNumber>
<ChapterTitle Language="En">The AVISS Security Protocol Analysis Tool</ChapterTitle>
<ChapterFirstPage>349</ChapterFirstPage>
<ChapterLastPage>354</ChapterLastPage>
<ChapterCopyright><CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2002</CopyrightYear>
</ChapterCopyright>
<ChapterHistory><RegistrationDate><Year>2002</Year>
<Month>9</Month>
<Day>19</Day>
</RegistrationDate>
<OnlineDate><Year>2002</Year>
<Month>9</Month>
<Day>20</Day>
</OnlineDate>
</ChapterHistory>
<ChapterGrants Type="Regular"><MetadataGrant Grant="OpenAccess"></MetadataGrant>
<AbstractGrant Grant="OpenAccess"></AbstractGrant>
<BodyPDFGrant Grant="Restricted"></BodyPDFGrant>
<BodyHTMLGrant Grant="Restricted"></BodyHTMLGrant>
<BibliographyGrant Grant="Restricted"></BibliographyGrant>
<ESMGrant Grant="Restricted"></ESMGrant>
</ChapterGrants>
<ChapterContext><SeriesID>558</SeriesID>
<PartID>9</PartID>
<BookID>3-540-45657-0</BookID>
<BookTitle>Computer Aided Verification</BookTitle>
</ChapterContext>
</ChapterInfo>
<ChapterHeader><AuthorGroup><Author AffiliationIDS="Aff6"><AuthorName DisplayOrder="Western"><GivenName>Alessandro</GivenName>
<FamilyName>Armando</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff7"><AuthorName DisplayOrder="Western"><GivenName>David</GivenName>
<FamilyName>Basin</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff8"><AuthorName DisplayOrder="Western"><GivenName>Mehdi</GivenName>
<FamilyName>Bouallagui</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff8"><AuthorName DisplayOrder="Western"><GivenName>Yannick</GivenName>
<FamilyName>Chevalier</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff6"><AuthorName DisplayOrder="Western"><GivenName>Luca</GivenName>
<FamilyName>Compagna</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff7"><AuthorName DisplayOrder="Western"><GivenName>Sebastian</GivenName>
<FamilyName>Mödersheim</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff8"><AuthorName DisplayOrder="Western"><GivenName>Michael</GivenName>
<FamilyName>Rusinowitch</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff8"><AuthorName DisplayOrder="Western"><GivenName>Mathieu</GivenName>
<FamilyName>Turuani</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff7"><AuthorName DisplayOrder="Western"><GivenName>Luca</GivenName>
<FamilyName>Viganò</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff8"><AuthorName DisplayOrder="Western"><GivenName>Laurent</GivenName>
<FamilyName>Vigneron</FamilyName>
</AuthorName>
</Author>
<Affiliation ID="Aff6"><OrgDivision>Mechanized Reasoning Group</OrgDivision>
<OrgName>DIST Università di Genova</OrgName>
<OrgAddress><Country>Italy</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff7"><OrgDivision>Institut für Informatik</OrgDivision>
<OrgName>Universität Freiburg</OrgName>
<OrgAddress><Country>Germany</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff8"><OrgName>LORIA-INRIA-Lorraine</OrgName>
<OrgAddress><City>Nancy</City>
<Country>France</Country>
</OrgAddress>
</Affiliation>
</AuthorGroup>
<Abstract ID="Abs1" Language="En"><Heading>Abstract</Heading>
<Para>We introduce AVISS, a tool for security protocol analysis that supports the integration of back-ends implementing different search techniques, allowing for their systematic and quantitative comparison and paving the way to their effective interaction. As a significant example, we have implemented three back-ends, and used the AVISS tool to analyze and find flaws in 36 protocols, including 31 problems in the Clark-Jacob’s protocol library and a previously unreported flaw in the Denning-Sacco protocol.</Para>
</Abstract>
<ArticleNote Type="Misc"><SimplePara>This work was supported by the FET Open Assessment Project IST-2000-26410, “AVISS: Automated Verification of Infinite State Systems”.</SimplePara>
</ArticleNote>
</ChapterHeader>
<NoBody></NoBody>
</Chapter>
</Part>
</Book>
</Series>
</Publisher>
</istex:document>
</istex:metadataXml>
<mods version="3.6"><titleInfo lang="en"><title>The AVISS Security Protocol Analysis Tool</title>
</titleInfo>
<titleInfo type="alternative" contentType="CDATA"><title>The AVISS Security Protocol Analysis Tool</title>
</titleInfo>
<name type="personal"><namePart type="given">Alessandro</namePart>
<namePart type="family">Armando</namePart>
<affiliation>Mechanized Reasoning Group, DIST Università di Genova, Italy</affiliation>
<role><roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">David</namePart>
<namePart type="family">Basin</namePart>
<affiliation>Institut für Informatik, Universität Freiburg, Germany</affiliation>
<role><roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Mehdi</namePart>
<namePart type="family">Bouallagui</namePart>
<affiliation>LORIA-INRIA-Lorraine, Nancy, France</affiliation>
<role><roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Yannick</namePart>
<namePart type="family">Chevalier</namePart>
<affiliation>LORIA-INRIA-Lorraine, Nancy, France</affiliation>
<role><roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Luca</namePart>
<namePart type="family">Compagna</namePart>
<affiliation>Mechanized Reasoning Group, DIST Università di Genova, Italy</affiliation>
<role><roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Sebastian</namePart>
<namePart type="family">Mödersheim</namePart>
<affiliation>Institut für Informatik, Universität Freiburg, Germany</affiliation>
<role><roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Michael</namePart>
<namePart type="family">Rusinowitch</namePart>
<affiliation>LORIA-INRIA-Lorraine, Nancy, France</affiliation>
<role><roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Mathieu</namePart>
<namePart type="family">Turuani</namePart>
<affiliation>LORIA-INRIA-Lorraine, Nancy, France</affiliation>
<role><roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Luca</namePart>
<namePart type="family">Viganò</namePart>
<affiliation>Institut für Informatik, Universität Freiburg, Germany</affiliation>
<role><roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Laurent</namePart>
<namePart type="family">Vigneron</namePart>
<affiliation>LORIA-INRIA-Lorraine, Nancy, France</affiliation>
<role><roleTerm type="text">author</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<genre displayLabel="OriginalPaper" authority="ISTEX" authorityURI="https://content-type.data.istex.fr" type="conference" valueURI="https://content-type.data.istex.fr/ark:/67375/XTP-BFHXPBJJ-3">conference</genre>
<originInfo><publisher>Springer Berlin Heidelberg</publisher>
<place><placeTerm type="text">Berlin, Heidelberg</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2002</dateIssued>
<copyrightDate encoding="w3cdtf">2002</copyrightDate>
</originInfo>
<language><languageTerm type="code" authority="rfc3066">en</languageTerm>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<abstract lang="en">Abstract: We introduce AVISS, a tool for security protocol analysis that supports the integration of back-ends implementing different search techniques, allowing for their systematic and quantitative comparison and paving the way to their effective interaction. As a significant example, we have implemented three back-ends, and used the AVISS tool to analyze and find flaws in 36 protocols, including 31 problems in the Clark-Jacob’s protocol library and a previously unreported flaw in the Denning-Sacco protocol.</abstract>
<relatedItem type="host"><titleInfo><title>Computer Aided Verification</title>
<subTitle>14th International Conference, CAV 2002 Copenhagen, Denmark, July 27–31, 2002 Proceedings</subTitle>
</titleInfo>
<name type="personal"><namePart type="given">Ed</namePart>
<namePart type="family">Brinksma</namePart>
<affiliation>Department of Computer Science, University of Twente, P. O. Box 217, 7500 AE, Enschede, The Netherlands</affiliation>
<affiliation>E-mail: brinksma@cs.utwente.nl</affiliation>
<role><roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Kim</namePart>
<namePart type="given">Guldstrand</namePart>
<namePart type="family">Larsen</namePart>
<affiliation>Department of Computer Science, Aalborg University, Fredrik Bajers Vej 7, 9220, Aalborg Ø, Denmark</affiliation>
<affiliation>E-mail: kgl@cs.auc.dk</affiliation>
<role><roleTerm type="text">editor</roleTerm>
</role>
</name>
<genre type="book-series" authority="ISTEX" authorityURI="https://publication-type.data.istex.fr" valueURI="https://publication-type.data.istex.fr/ark:/67375/JMC-0G6R5W5T-Z">book-series</genre>
<originInfo><publisher>Springer</publisher>
<copyrightDate encoding="w3cdtf">2002</copyrightDate>
<issuance>monographic</issuance>
</originInfo>
<subject><genre>Book-Subject-Collection</genre>
<topic authority="SpringerSubjectCodes" authorityURI="SUCO11645">Computer Science</topic>
</subject>
<subject><genre>Book-Subject-Group</genre>
<topic authority="SpringerSubjectCodes" authorityURI="I">Computer Science</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I1603X">Logics and Meanings of Programs</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I14029">Software Engineering</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I16048">Mathematical Logic and Formal Languages</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I21017">Artificial Intelligence (incl. Robotics)</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I13030">Special Purpose and Application-Based Systems</topic>
</subject>
<identifier type="DOI">10.1007/3-540-45657-0</identifier>
<identifier type="ISBN">978-3-540-43997-4</identifier>
<identifier type="eISBN">978-3-540-45657-5</identifier>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="BookTitleID">72662</identifier>
<identifier type="BookID">3-540-45657-0</identifier>
<identifier type="BookChapterCount">51</identifier>
<identifier type="BookVolumeNumber">2404</identifier>
<identifier type="BookSequenceNumber">2404</identifier>
<identifier type="PartChapterCount">6</identifier>
<part><date>2002</date>
<detail type="part"><title>Tool Presentations</title>
</detail>
<detail type="volume"><number>2404</number>
<caption>vol.</caption>
</detail>
<extent unit="pages"><start>349</start>
<end>354</end>
</extent>
</part>
<recordInfo><recordOrigin>Springer-Verlag Berlin Heidelberg, 2002</recordOrigin>
</recordInfo>
</relatedItem>
<relatedItem type="series"><titleInfo><title>Lecture Notes in Computer Science</title>
</titleInfo>
<name type="personal"><namePart type="given">Gerhard</namePart>
<namePart type="family">Goos</namePart>
<affiliation>Karlsruhe University, Germany</affiliation>
<role><roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Juris</namePart>
<namePart type="family">Hartmanis</namePart>
<affiliation>Cornell University, NY, USA</affiliation>
<role><roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal"><namePart type="given">Jan</namePart>
<namePart type="family">van Leeuwen</namePart>
<affiliation>Utrecht University, The Netherlands</affiliation>
<role><roleTerm type="text">editor</roleTerm>
</role>
</name>
<originInfo><publisher>Springer</publisher>
<copyrightDate encoding="w3cdtf">2002</copyrightDate>
<issuance>serial</issuance>
</originInfo>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="SeriesID">558</identifier>
<recordInfo><recordOrigin>Springer-Verlag Berlin Heidelberg, 2002</recordOrigin>
</recordInfo>
</relatedItem>
<identifier type="istex">9DFCCDE838AB8BE098C6BA03ABFA04E8C0E8E987</identifier>
<identifier type="ark">ark:/67375/HCB-9WBPRPG0-H</identifier>
<identifier type="DOI">10.1007/3-540-45657-0_27</identifier>
<identifier type="ChapterID">27</identifier>
<identifier type="ChapterID">Chap27</identifier>
<accessCondition type="use and reproduction" contentType="copyright">Springer-Verlag Berlin Heidelberg, 2002</accessCondition>
<recordInfo><recordContentSource authority="ISTEX" authorityURI="https://loaded-corpus.data.istex.fr" valueURI="https://loaded-corpus.data.istex.fr/ark:/67375/XBH-RLRX46XW-4">springer</recordContentSource>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2002</recordOrigin>
</recordInfo>
</mods>
<json:item><extension>json</extension>
<original>false</original>
<mimetype>application/json</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-9WBPRPG0-H/record.json</uri>
</json:item>
</metadata>
</istex>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Istex/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 002504 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Istex/Corpus/biblio.hfd -nk 002504 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Wicri/Lorraine |area= InforLorV4 |flux= Istex |étape= Corpus |type= RBID |clé= ISTEX:9DFCCDE838AB8BE098C6BA03ABFA04E8C0E8E987 |texte= The AVISS Security Protocol Analysis Tool }}
This area was generated with Dilib version V0.6.33. |