Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

The AVISS Security Protocol Analysis Tool

Identifieur interne : 002504 ( Istex/Corpus ); précédent : 002503; suivant : 002505

The AVISS Security Protocol Analysis Tool

Auteurs : Alessandro Armando ; David Basin ; Mehdi Bouallagui ; Yannick Chevalier ; Luca Compagna ; Sebastian Mödersheim ; Michael Rusinowitch ; Mathieu Turuani ; Luca Vigan ; Laurent Vigneron

Source :

RBID : ISTEX:9DFCCDE838AB8BE098C6BA03ABFA04E8C0E8E987

Abstract

Abstract: We introduce AVISS, a tool for security protocol analysis that supports the integration of back-ends implementing different search techniques, allowing for their systematic and quantitative comparison and paving the way to their effective interaction. As a significant example, we have implemented three back-ends, and used the AVISS tool to analyze and find flaws in 36 protocols, including 31 problems in the Clark-Jacob’s protocol library and a previously unreported flaw in the Denning-Sacco protocol.

Url:
DOI: 10.1007/3-540-45657-0_27

Links to Exploration step

ISTEX:9DFCCDE838AB8BE098C6BA03ABFA04E8C0E8E987

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">The AVISS Security Protocol Analysis Tool</title>
<author>
<name sortKey="Armando, Alessandro" sort="Armando, Alessandro" uniqKey="Armando A" first="Alessandro" last="Armando">Alessandro Armando</name>
<affiliation>
<mods:affiliation>Mechanized Reasoning Group, DIST Università di Genova, Italy</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Basin, David" sort="Basin, David" uniqKey="Basin D" first="David" last="Basin">David Basin</name>
<affiliation>
<mods:affiliation>Institut für Informatik, Universität Freiburg, Germany</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Bouallagui, Mehdi" sort="Bouallagui, Mehdi" uniqKey="Bouallagui M" first="Mehdi" last="Bouallagui">Mehdi Bouallagui</name>
<affiliation>
<mods:affiliation>LORIA-INRIA-Lorraine, Nancy, France</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Chevalier, Yannick" sort="Chevalier, Yannick" uniqKey="Chevalier Y" first="Yannick" last="Chevalier">Yannick Chevalier</name>
<affiliation>
<mods:affiliation>LORIA-INRIA-Lorraine, Nancy, France</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Compagna, Luca" sort="Compagna, Luca" uniqKey="Compagna L" first="Luca" last="Compagna">Luca Compagna</name>
<affiliation>
<mods:affiliation>Mechanized Reasoning Group, DIST Università di Genova, Italy</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Modersheim, Sebastian" sort="Modersheim, Sebastian" uniqKey="Modersheim S" first="Sebastian" last="Mödersheim">Sebastian Mödersheim</name>
<affiliation>
<mods:affiliation>Institut für Informatik, Universität Freiburg, Germany</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Rusinowitch, Michael" sort="Rusinowitch, Michael" uniqKey="Rusinowitch M" first="Michael" last="Rusinowitch">Michael Rusinowitch</name>
<affiliation>
<mods:affiliation>LORIA-INRIA-Lorraine, Nancy, France</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Turuani, Mathieu" sort="Turuani, Mathieu" uniqKey="Turuani M" first="Mathieu" last="Turuani">Mathieu Turuani</name>
<affiliation>
<mods:affiliation>LORIA-INRIA-Lorraine, Nancy, France</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Vigan, Luca" sort="Vigan, Luca" uniqKey="Vigan L" first="Luca" last="Vigan">Luca Vigan</name>
<affiliation>
<mods:affiliation>Institut für Informatik, Universität Freiburg, Germany</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Vigneron, Laurent" sort="Vigneron, Laurent" uniqKey="Vigneron L" first="Laurent" last="Vigneron">Laurent Vigneron</name>
<affiliation>
<mods:affiliation>LORIA-INRIA-Lorraine, Nancy, France</mods:affiliation>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:9DFCCDE838AB8BE098C6BA03ABFA04E8C0E8E987</idno>
<date when="2002" year="2002">2002</date>
<idno type="doi">10.1007/3-540-45657-0_27</idno>
<idno type="url">https://api.istex.fr/ark:/67375/HCB-9WBPRPG0-H/fulltext.pdf</idno>
<idno type="wicri:Area/Istex/Corpus">002504</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">002504</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">The AVISS Security Protocol Analysis Tool</title>
<author>
<name sortKey="Armando, Alessandro" sort="Armando, Alessandro" uniqKey="Armando A" first="Alessandro" last="Armando">Alessandro Armando</name>
<affiliation>
<mods:affiliation>Mechanized Reasoning Group, DIST Università di Genova, Italy</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Basin, David" sort="Basin, David" uniqKey="Basin D" first="David" last="Basin">David Basin</name>
<affiliation>
<mods:affiliation>Institut für Informatik, Universität Freiburg, Germany</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Bouallagui, Mehdi" sort="Bouallagui, Mehdi" uniqKey="Bouallagui M" first="Mehdi" last="Bouallagui">Mehdi Bouallagui</name>
<affiliation>
<mods:affiliation>LORIA-INRIA-Lorraine, Nancy, France</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Chevalier, Yannick" sort="Chevalier, Yannick" uniqKey="Chevalier Y" first="Yannick" last="Chevalier">Yannick Chevalier</name>
<affiliation>
<mods:affiliation>LORIA-INRIA-Lorraine, Nancy, France</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Compagna, Luca" sort="Compagna, Luca" uniqKey="Compagna L" first="Luca" last="Compagna">Luca Compagna</name>
<affiliation>
<mods:affiliation>Mechanized Reasoning Group, DIST Università di Genova, Italy</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Modersheim, Sebastian" sort="Modersheim, Sebastian" uniqKey="Modersheim S" first="Sebastian" last="Mödersheim">Sebastian Mödersheim</name>
<affiliation>
<mods:affiliation>Institut für Informatik, Universität Freiburg, Germany</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Rusinowitch, Michael" sort="Rusinowitch, Michael" uniqKey="Rusinowitch M" first="Michael" last="Rusinowitch">Michael Rusinowitch</name>
<affiliation>
<mods:affiliation>LORIA-INRIA-Lorraine, Nancy, France</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Turuani, Mathieu" sort="Turuani, Mathieu" uniqKey="Turuani M" first="Mathieu" last="Turuani">Mathieu Turuani</name>
<affiliation>
<mods:affiliation>LORIA-INRIA-Lorraine, Nancy, France</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Vigan, Luca" sort="Vigan, Luca" uniqKey="Vigan L" first="Luca" last="Vigan">Luca Vigan</name>
<affiliation>
<mods:affiliation>Institut für Informatik, Universität Freiburg, Germany</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Vigneron, Laurent" sort="Vigneron, Laurent" uniqKey="Vigneron L" first="Laurent" last="Vigneron">Laurent Vigneron</name>
<affiliation>
<mods:affiliation>LORIA-INRIA-Lorraine, Nancy, France</mods:affiliation>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s" type="main" xml:lang="en">Lecture Notes in Computer Science</title>
<idno type="ISSN">0302-9743</idno>
<idno type="ISSN">0302-9743</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: We introduce AVISS, a tool for security protocol analysis that supports the integration of back-ends implementing different search techniques, allowing for their systematic and quantitative comparison and paving the way to their effective interaction. As a significant example, we have implemented three back-ends, and used the AVISS tool to analyze and find flaws in 36 protocols, including 31 problems in the Clark-Jacob’s protocol library and a previously unreported flaw in the Denning-Sacco protocol.</div>
</front>
</TEI>
<istex>
<corpusName>springer-ebooks</corpusName>
<author>
<json:item>
<name>Alessandro Armando</name>
<affiliations>
<json:string>Mechanized Reasoning Group, DIST Università di Genova, Italy</json:string>
</affiliations>
</json:item>
<json:item>
<name>David Basin</name>
<affiliations>
<json:string>Institut für Informatik, Universität Freiburg, Germany</json:string>
</affiliations>
</json:item>
<json:item>
<name>Mehdi Bouallagui</name>
<affiliations>
<json:string>LORIA-INRIA-Lorraine, Nancy, France</json:string>
</affiliations>
</json:item>
<json:item>
<name>Yannick Chevalier</name>
<affiliations>
<json:string>LORIA-INRIA-Lorraine, Nancy, France</json:string>
</affiliations>
</json:item>
<json:item>
<name>Luca Compagna</name>
<affiliations>
<json:string>Mechanized Reasoning Group, DIST Università di Genova, Italy</json:string>
</affiliations>
</json:item>
<json:item>
<name>Sebastian Mödersheim</name>
<affiliations>
<json:string>Institut für Informatik, Universität Freiburg, Germany</json:string>
</affiliations>
</json:item>
<json:item>
<name>Michael Rusinowitch</name>
<affiliations>
<json:string>LORIA-INRIA-Lorraine, Nancy, France</json:string>
</affiliations>
</json:item>
<json:item>
<name>Mathieu Turuani</name>
<affiliations>
<json:string>LORIA-INRIA-Lorraine, Nancy, France</json:string>
</affiliations>
</json:item>
<json:item>
<name>Luca Viganò</name>
<affiliations>
<json:string>Institut für Informatik, Universität Freiburg, Germany</json:string>
</affiliations>
</json:item>
<json:item>
<name>Laurent Vigneron</name>
<affiliations>
<json:string>LORIA-INRIA-Lorraine, Nancy, France</json:string>
</affiliations>
</json:item>
</author>
<arkIstex>ark:/67375/HCB-9WBPRPG0-H</arkIstex>
<language>
<json:string>eng</json:string>
</language>
<originalGenre>
<json:string>OriginalPaper</json:string>
</originalGenre>
<abstract>Abstract: We introduce AVISS, a tool for security protocol analysis that supports the integration of back-ends implementing different search techniques, allowing for their systematic and quantitative comparison and paving the way to their effective interaction. As a significant example, we have implemented three back-ends, and used the AVISS tool to analyze and find flaws in 36 protocols, including 31 problems in the Clark-Jacob’s protocol library and a previously unreported flaw in the Denning-Sacco protocol.</abstract>
<qualityIndicators>
<score>4.666</score>
<pdfWordCount>1778</pdfWordCount>
<pdfCharCount>11571</pdfCharCount>
<pdfVersion>1.3</pdfVersion>
<pdfPageCount>6</pdfPageCount>
<pdfPageSize>451 x 677.12 pts</pdfPageSize>
<refBibsNative>false</refBibsNative>
<abstractWordCount>74</abstractWordCount>
<abstractCharCount>515</abstractCharCount>
<keywordCount>0</keywordCount>
</qualityIndicators>
<title>The AVISS Security Protocol Analysis Tool</title>
<chapterId>
<json:string>27</json:string>
<json:string>Chap27</json:string>
</chapterId>
<genre>
<json:string>conference</json:string>
</genre>
<serie>
<title>Lecture Notes in Computer Science</title>
<language>
<json:string>unknown</json:string>
</language>
<copyrightDate>2002</copyrightDate>
<issn>
<json:string>0302-9743</json:string>
</issn>
<editor>
<json:item>
<name>Gerhard Goos</name>
<affiliations>
<json:string>Karlsruhe University, Germany</json:string>
</affiliations>
</json:item>
<json:item>
<name>Juris Hartmanis</name>
<affiliations>
<json:string>Cornell University, NY, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Jan van Leeuwen</name>
<affiliations>
<json:string>Utrecht University, The Netherlands</json:string>
</affiliations>
</json:item>
</editor>
</serie>
<host>
<title>Computer Aided Verification</title>
<language>
<json:string>unknown</json:string>
</language>
<copyrightDate>2002</copyrightDate>
<doi>
<json:string>10.1007/3-540-45657-0</json:string>
</doi>
<issn>
<json:string>0302-9743</json:string>
</issn>
<eisbn>
<json:string>978-3-540-45657-5</json:string>
</eisbn>
<bookId>
<json:string>3-540-45657-0</json:string>
</bookId>
<isbn>
<json:string>978-3-540-43997-4</json:string>
</isbn>
<volume>2404</volume>
<pages>
<first>349</first>
<last>354</last>
</pages>
<genre>
<json:string>book-series</json:string>
</genre>
<editor>
<json:item>
<name>Ed Brinksma</name>
<affiliations>
<json:string>Department of Computer Science, University of Twente, P. O. Box 217, 7500 AE, Enschede, The Netherlands</json:string>
<json:string>E-mail: brinksma@cs.utwente.nl</json:string>
</affiliations>
</json:item>
<json:item>
<name>Kim Guldstrand Larsen</name>
<affiliations>
<json:string>Department of Computer Science, Aalborg University, Fredrik Bajers Vej 7, 9220, Aalborg Ø, Denmark</json:string>
<json:string>E-mail: kgl@cs.auc.dk</json:string>
</affiliations>
</json:item>
</editor>
<subject>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Logics and Meanings of Programs</value>
</json:item>
<json:item>
<value>Software Engineering</value>
</json:item>
<json:item>
<value>Mathematical Logic and Formal Languages</value>
</json:item>
<json:item>
<value>Artificial Intelligence (incl. Robotics)</value>
</json:item>
<json:item>
<value>Special Purpose and Application-Based Systems</value>
</json:item>
</subject>
</host>
<ark>
<json:string>ark:/67375/HCB-9WBPRPG0-H</json:string>
</ark>
<publicationDate>2002</publicationDate>
<copyrightDate>2002</copyrightDate>
<doi>
<json:string>10.1007/3-540-45657-0_27</json:string>
</doi>
<id>9DFCCDE838AB8BE098C6BA03ABFA04E8C0E8E987</id>
<score>1</score>
<fulltext>
<json:item>
<extension>pdf</extension>
<original>true</original>
<mimetype>application/pdf</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-9WBPRPG0-H/fulltext.pdf</uri>
</json:item>
<json:item>
<extension>zip</extension>
<original>false</original>
<mimetype>application/zip</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-9WBPRPG0-H/bundle.zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/ark:/67375/HCB-9WBPRPG0-H/fulltext.tei">
<teiHeader>
<fileDesc>
<titleStmt>
<title level="a" type="main" xml:lang="en">The AVISS Security Protocol Analysis Tool</title>
</titleStmt>
<publicationStmt>
<authority>ISTEX</authority>
<availability>
<licence>Springer-Verlag Berlin Heidelberg</licence>
</availability>
<date when="2002">2002</date>
</publicationStmt>
<notesStmt>
<note type="conference" source="proceedings" scheme="https://content-type.data.istex.fr/ark:/67375/XTP-BFHXPBJJ-3">conference</note>
<note type="publication-type" subtype="book-series" scheme="https://publication-type.data.istex.fr/ark:/67375/JMC-0G6R5W5T-Z">book-series</note>
</notesStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">The AVISS Security Protocol Analysis Tool</title>
<author>
<persName>
<forename type="first">Alessandro</forename>
<surname>Armando</surname>
</persName>
<affiliation>
<orgName type="department">Mechanized Reasoning Group</orgName>
<orgName type="institution">DIST Università di Genova</orgName>
<address>
<country key="IT">ITALY</country>
</address>
</affiliation>
</author>
<author>
<persName>
<forename type="first">David</forename>
<surname>Basin</surname>
</persName>
<affiliation>
<orgName type="department">Institut für Informatik</orgName>
<orgName type="institution">Universität Freiburg</orgName>
<address>
<country key="DE">GERMANY</country>
</address>
</affiliation>
</author>
<author>
<persName>
<forename type="first">Mehdi</forename>
<surname>Bouallagui</surname>
</persName>
<affiliation>
<orgName type="institution">LORIA-INRIA-Lorraine</orgName>
<address>
<settlement>Nancy</settlement>
<country key="FR">FRANCE</country>
</address>
</affiliation>
</author>
<author>
<persName>
<forename type="first">Yannick</forename>
<surname>Chevalier</surname>
</persName>
<affiliation>
<orgName type="institution">LORIA-INRIA-Lorraine</orgName>
<address>
<settlement>Nancy</settlement>
<country key="FR">FRANCE</country>
</address>
</affiliation>
</author>
<author>
<persName>
<forename type="first">Luca</forename>
<surname>Compagna</surname>
</persName>
<affiliation>
<orgName type="department">Mechanized Reasoning Group</orgName>
<orgName type="institution">DIST Università di Genova</orgName>
<address>
<country key="IT">ITALY</country>
</address>
</affiliation>
</author>
<author>
<persName>
<forename type="first">Sebastian</forename>
<surname>Mödersheim</surname>
</persName>
<affiliation>
<orgName type="department">Institut für Informatik</orgName>
<orgName type="institution">Universität Freiburg</orgName>
<address>
<country key="DE">GERMANY</country>
</address>
</affiliation>
</author>
<author>
<persName>
<forename type="first">Michael</forename>
<surname>Rusinowitch</surname>
</persName>
<affiliation>
<orgName type="institution">LORIA-INRIA-Lorraine</orgName>
<address>
<settlement>Nancy</settlement>
<country key="FR">FRANCE</country>
</address>
</affiliation>
</author>
<author>
<persName>
<forename type="first">Mathieu</forename>
<surname>Turuani</surname>
</persName>
<affiliation>
<orgName type="institution">LORIA-INRIA-Lorraine</orgName>
<address>
<settlement>Nancy</settlement>
<country key="FR">FRANCE</country>
</address>
</affiliation>
</author>
<author>
<persName>
<forename type="first">Luca</forename>
<surname>Viganò</surname>
</persName>
<affiliation>
<orgName type="department">Institut für Informatik</orgName>
<orgName type="institution">Universität Freiburg</orgName>
<address>
<country key="DE">GERMANY</country>
</address>
</affiliation>
</author>
<author>
<persName>
<forename type="first">Laurent</forename>
<surname>Vigneron</surname>
</persName>
<affiliation>
<orgName type="institution">LORIA-INRIA-Lorraine</orgName>
<address>
<settlement>Nancy</settlement>
<country key="FR">FRANCE</country>
</address>
</affiliation>
</author>
<idno type="istex">9DFCCDE838AB8BE098C6BA03ABFA04E8C0E8E987</idno>
<idno type="ark">ark:/67375/HCB-9WBPRPG0-H</idno>
<idno type="DOI">10.1007/3-540-45657-0_27</idno>
</analytic>
<monogr>
<title level="m" type="main">Computer Aided Verification</title>
<title level="m" type="sub">14th International Conference, CAV 2002 Copenhagen, Denmark, July 27–31, 2002 Proceedings</title>
<title level="m" type="part">Tool Presentations</title>
<idno type="DOI">10.1007/3-540-45657-0</idno>
<idno type="book-id">3-540-45657-0</idno>
<idno type="ISBN">978-3-540-43997-4</idno>
<idno type="eISBN">978-3-540-45657-5</idno>
<idno type="chapter-id">Chap27</idno>
<idno type="part-id">Part9</idno>
<editor>
<persName>
<forename type="first">Ed</forename>
<surname>Brinksma</surname>
</persName>
<email>brinksma@cs.utwente.nl</email>
<affiliation>
<orgName type="department">Department of Computer Science</orgName>
<orgName type="institution">University of Twente</orgName>
<address>
<postBox>P. O. Box 217</postBox>
<postCode>7500 AE</postCode>
<settlement>Enschede</settlement>
<country key=""></country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Kim</forename>
<forename type="first">Guldstrand</forename>
<surname>Larsen</surname>
</persName>
<email>kgl@cs.auc.dk</email>
<affiliation>
<orgName type="department">Department of Computer Science</orgName>
<orgName type="institution">Aalborg University</orgName>
<address>
<street>Fredrik Bajers Vej 7</street>
<postCode>9220</postCode>
<settlement>Aalborg Ø</settlement>
<country key="DK">DENMARK</country>
</address>
</affiliation>
</editor>
<imprint>
<biblScope unit="vol">2404</biblScope>
<biblScope unit="page" from="349">349</biblScope>
<biblScope unit="page" to="354">354</biblScope>
<biblScope unit="chapter-count">51</biblScope>
<biblScope unit="part-chapter-count">6</biblScope>
</imprint>
</monogr>
<series>
<title level="s" type="main" xml:lang="en">Lecture Notes in Computer Science</title>
<editor>
<persName>
<forename type="first">Gerhard</forename>
<surname>Goos</surname>
</persName>
<affiliation>
<orgName type="institution">Karlsruhe University</orgName>
<address>
<country key="DE">GERMANY</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Juris</forename>
<surname>Hartmanis</surname>
</persName>
<affiliation>
<orgName type="institution">Cornell University</orgName>
<address>
<region>NY</region>
<country key="US">UNITED STATES</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Jan</forename>
<nameLink>van</nameLink>
<surname>Leeuwen</surname>
</persName>
<affiliation>
<orgName type="institution">Utrecht University</orgName>
<address>
<country key=""></country>
</address>
</affiliation>
</editor>
<idno type="pISSN">0302-9743</idno>
<idno type="seriesID">558</idno>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<abstract xml:lang="en">
<head>Abstract</head>
<p>We introduce AVISS, a tool for security protocol analysis that supports the integration of back-ends implementing different search techniques, allowing for their systematic and quantitative comparison and paving the way to their effective interaction. As a significant example, we have implemented three back-ends, and used the AVISS tool to analyze and find flaws in 36 protocols, including 31 problems in the Clark-Jacob’s protocol library and a previously unreported flaw in the Denning-Sacco protocol.</p>
</abstract>
<textClass ana="subject">
<keywords scheme="book-subject-collection">
<list>
<label>SUCO11645</label>
<item>
<term>Computer Science</term>
</item>
</list>
</keywords>
</textClass>
<textClass ana="subject">
<keywords scheme="book-subject">
<list>
<label>I</label>
<item>
<term type="Primary">Computer Science</term>
</item>
<label>I1603X</label>
<item>
<term type="Secondary" subtype="priority-1">Logics and Meanings of Programs</term>
</item>
<label>I14029</label>
<item>
<term type="Secondary" subtype="priority-2">Software Engineering</term>
</item>
<label>I16048</label>
<item>
<term type="Secondary" subtype="priority-3">Mathematical Logic and Formal Languages</term>
</item>
<label>I21017</label>
<item>
<term type="Secondary" subtype="priority-4">Artificial Intelligence (incl. Robotics)</term>
</item>
<label>I13030</label>
<item>
<term type="Secondary" subtype="priority-5">Special Purpose and Application-Based Systems</term>
</item>
</list>
</keywords>
</textClass>
<langUsage>
<language ident="EN"></language>
</langUsage>
</profileDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item>
<extension>txt</extension>
<original>false</original>
<mimetype>text/plain</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-9WBPRPG0-H/fulltext.txt</uri>
</json:item>
</fulltext>
<metadata>
<istex:metadataXml wicri:clean="corpus springer-ebooks not found" wicri:toSee="no header">
<istex:xmlDeclaration>version="1.0" encoding="UTF-8"</istex:xmlDeclaration>
<istex:docType PUBLIC="-//Springer-Verlag//DTD A++ V2.4//EN" URI="http://devel.springer.de/A++/V2.4/DTD/A++V2.4.dtd" name="istex:docType"></istex:docType>
<istex:document>
<Publisher>
<PublisherInfo>
<PublisherName>Springer Berlin Heidelberg</PublisherName>
<PublisherLocation>Berlin, Heidelberg</PublisherLocation>
</PublisherInfo>
<Series>
<SeriesInfo SeriesType="Series" TocLevels="0">
<SeriesID>558</SeriesID>
<SeriesPrintISSN>0302-9743</SeriesPrintISSN>
<SeriesTitle Language="En">Lecture Notes in Computer Science</SeriesTitle>
</SeriesInfo>
<SeriesHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff1">
<EditorName DisplayOrder="Western">
<GivenName>Gerhard</GivenName>
<FamilyName>Goos</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff2">
<EditorName DisplayOrder="Western">
<GivenName>Juris</GivenName>
<FamilyName>Hartmanis</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff3">
<EditorName DisplayOrder="Western">
<GivenName>Jan</GivenName>
<Particle>van</Particle>
<FamilyName>Leeuwen</FamilyName>
</EditorName>
</Editor>
<Affiliation ID="Aff1">
<OrgName>Karlsruhe University</OrgName>
<OrgAddress>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff2">
<OrgName>Cornell University</OrgName>
<OrgAddress>
<State>NY</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff3">
<OrgName>Utrecht University</OrgName>
<OrgAddress>
<Country>The Netherlands</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</SeriesHeader>
<Book Language="En">
<BookInfo BookProductType="Proceedings" Language="En" MediaType="eBook" NumberingStyle="Unnumbered" TocLevels="0">
<BookID>3-540-45657-0</BookID>
<BookTitle>Computer Aided Verification</BookTitle>
<BookSubTitle>14th International Conference, CAV 2002 Copenhagen, Denmark, July 27–31, 2002 Proceedings</BookSubTitle>
<BookVolumeNumber>2404</BookVolumeNumber>
<BookSequenceNumber>2404</BookSequenceNumber>
<BookDOI>10.1007/3-540-45657-0</BookDOI>
<BookTitleID>72662</BookTitleID>
<BookPrintISBN>978-3-540-43997-4</BookPrintISBN>
<BookElectronicISBN>978-3-540-45657-5</BookElectronicISBN>
<BookChapterCount>51</BookChapterCount>
<BookHistory>
<OnlineDate>
<Year>2002</Year>
<Month>9</Month>
<Day>20</Day>
</OnlineDate>
</BookHistory>
<BookCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2002</CopyrightYear>
</BookCopyright>
<BookSubjectGroup>
<BookSubject Code="I" Type="Primary">Computer Science</BookSubject>
<BookSubject Code="I1603X" Priority="1" Type="Secondary">Logics and Meanings of Programs</BookSubject>
<BookSubject Code="I14029" Priority="2" Type="Secondary">Software Engineering</BookSubject>
<BookSubject Code="I16048" Priority="3" Type="Secondary">Mathematical Logic and Formal Languages</BookSubject>
<BookSubject Code="I21017" Priority="4" Type="Secondary">Artificial Intelligence (incl. Robotics)</BookSubject>
<BookSubject Code="I13030" Priority="5" Type="Secondary">Special Purpose and Application-Based Systems</BookSubject>
<SubjectCollection Code="SUCO11645">Computer Science</SubjectCollection>
</BookSubjectGroup>
<BookContext>
<SeriesID>558</SeriesID>
</BookContext>
</BookInfo>
<BookHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff4">
<EditorName DisplayOrder="Western">
<GivenName>Ed</GivenName>
<FamilyName>Brinksma</FamilyName>
</EditorName>
<Contact>
<Email>brinksma@cs.utwente.nl</Email>
</Contact>
</Editor>
<Editor AffiliationIDS="Aff5">
<EditorName DisplayOrder="Western">
<GivenName>Kim</GivenName>
<GivenName>Guldstrand</GivenName>
<FamilyName>Larsen</FamilyName>
</EditorName>
<Contact>
<Email>kgl@cs.auc.dk</Email>
</Contact>
</Editor>
<Affiliation ID="Aff4">
<OrgDivision>Department of Computer Science</OrgDivision>
<OrgName>University of Twente</OrgName>
<OrgAddress>
<Postbox>P. O. Box 217</Postbox>
<Postcode>7500 AE</Postcode>
<City>Enschede</City>
<Country>The Netherlands</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff5">
<OrgDivision>Department of Computer Science</OrgDivision>
<OrgName>Aalborg University</OrgName>
<OrgAddress>
<Street>Fredrik Bajers Vej 7</Street>
<Postcode>9220</Postcode>
<City>Aalborg Ø</City>
<Country>Denmark</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</BookHeader>
<Part ID="Part9">
<PartInfo TocLevels="0">
<PartID>9</PartID>
<PartSequenceNumber>9</PartSequenceNumber>
<PartTitle>Tool Presentations</PartTitle>
<PartChapterCount>6</PartChapterCount>
<PartContext>
<SeriesID>558</SeriesID>
<BookID>3-540-45657-0</BookID>
<BookTitle>Computer Aided Verification</BookTitle>
</PartContext>
</PartInfo>
<Chapter ID="Chap27" Language="En">
<ChapterInfo ChapterType="OriginalPaper" ContainsESM="No" Language="En" NumberingStyle="Unnumbered" TocLevels="0">
<ChapterID>27</ChapterID>
<ChapterDOI>10.1007/3-540-45657-0_27</ChapterDOI>
<ChapterSequenceNumber>27</ChapterSequenceNumber>
<ChapterTitle Language="En">The AVISS Security Protocol Analysis Tool</ChapterTitle>
<ChapterFirstPage>349</ChapterFirstPage>
<ChapterLastPage>354</ChapterLastPage>
<ChapterCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2002</CopyrightYear>
</ChapterCopyright>
<ChapterHistory>
<RegistrationDate>
<Year>2002</Year>
<Month>9</Month>
<Day>19</Day>
</RegistrationDate>
<OnlineDate>
<Year>2002</Year>
<Month>9</Month>
<Day>20</Day>
</OnlineDate>
</ChapterHistory>
<ChapterGrants Type="Regular">
<MetadataGrant Grant="OpenAccess"></MetadataGrant>
<AbstractGrant Grant="OpenAccess"></AbstractGrant>
<BodyPDFGrant Grant="Restricted"></BodyPDFGrant>
<BodyHTMLGrant Grant="Restricted"></BodyHTMLGrant>
<BibliographyGrant Grant="Restricted"></BibliographyGrant>
<ESMGrant Grant="Restricted"></ESMGrant>
</ChapterGrants>
<ChapterContext>
<SeriesID>558</SeriesID>
<PartID>9</PartID>
<BookID>3-540-45657-0</BookID>
<BookTitle>Computer Aided Verification</BookTitle>
</ChapterContext>
</ChapterInfo>
<ChapterHeader>
<AuthorGroup>
<Author AffiliationIDS="Aff6">
<AuthorName DisplayOrder="Western">
<GivenName>Alessandro</GivenName>
<FamilyName>Armando</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff7">
<AuthorName DisplayOrder="Western">
<GivenName>David</GivenName>
<FamilyName>Basin</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff8">
<AuthorName DisplayOrder="Western">
<GivenName>Mehdi</GivenName>
<FamilyName>Bouallagui</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff8">
<AuthorName DisplayOrder="Western">
<GivenName>Yannick</GivenName>
<FamilyName>Chevalier</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff6">
<AuthorName DisplayOrder="Western">
<GivenName>Luca</GivenName>
<FamilyName>Compagna</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff7">
<AuthorName DisplayOrder="Western">
<GivenName>Sebastian</GivenName>
<FamilyName>Mödersheim</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff8">
<AuthorName DisplayOrder="Western">
<GivenName>Michael</GivenName>
<FamilyName>Rusinowitch</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff8">
<AuthorName DisplayOrder="Western">
<GivenName>Mathieu</GivenName>
<FamilyName>Turuani</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff7">
<AuthorName DisplayOrder="Western">
<GivenName>Luca</GivenName>
<FamilyName>Viganò</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff8">
<AuthorName DisplayOrder="Western">
<GivenName>Laurent</GivenName>
<FamilyName>Vigneron</FamilyName>
</AuthorName>
</Author>
<Affiliation ID="Aff6">
<OrgDivision>Mechanized Reasoning Group</OrgDivision>
<OrgName>DIST Università di Genova</OrgName>
<OrgAddress>
<Country>Italy</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff7">
<OrgDivision>Institut für Informatik</OrgDivision>
<OrgName>Universität Freiburg</OrgName>
<OrgAddress>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff8">
<OrgName>LORIA-INRIA-Lorraine</OrgName>
<OrgAddress>
<City>Nancy</City>
<Country>France</Country>
</OrgAddress>
</Affiliation>
</AuthorGroup>
<Abstract ID="Abs1" Language="En">
<Heading>Abstract</Heading>
<Para>We introduce AVISS, a tool for security protocol analysis that supports the integration of back-ends implementing different search techniques, allowing for their systematic and quantitative comparison and paving the way to their effective interaction. As a significant example, we have implemented three back-ends, and used the AVISS tool to analyze and find flaws in 36 protocols, including 31 problems in the Clark-Jacob’s protocol library and a previously unreported flaw in the Denning-Sacco protocol.</Para>
</Abstract>
<ArticleNote Type="Misc">
<SimplePara>This work was supported by the FET Open Assessment Project IST-2000-26410, “AVISS: Automated Verification of Infinite State Systems”.</SimplePara>
</ArticleNote>
</ChapterHeader>
<NoBody></NoBody>
</Chapter>
</Part>
</Book>
</Series>
</Publisher>
</istex:document>
</istex:metadataXml>
<mods version="3.6">
<titleInfo lang="en">
<title>The AVISS Security Protocol Analysis Tool</title>
</titleInfo>
<titleInfo type="alternative" contentType="CDATA">
<title>The AVISS Security Protocol Analysis Tool</title>
</titleInfo>
<name type="personal">
<namePart type="given">Alessandro</namePart>
<namePart type="family">Armando</namePart>
<affiliation>Mechanized Reasoning Group, DIST Università di Genova, Italy</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">David</namePart>
<namePart type="family">Basin</namePart>
<affiliation>Institut für Informatik, Universität Freiburg, Germany</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Mehdi</namePart>
<namePart type="family">Bouallagui</namePart>
<affiliation>LORIA-INRIA-Lorraine, Nancy, France</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Yannick</namePart>
<namePart type="family">Chevalier</namePart>
<affiliation>LORIA-INRIA-Lorraine, Nancy, France</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Luca</namePart>
<namePart type="family">Compagna</namePart>
<affiliation>Mechanized Reasoning Group, DIST Università di Genova, Italy</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Sebastian</namePart>
<namePart type="family">Mödersheim</namePart>
<affiliation>Institut für Informatik, Universität Freiburg, Germany</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Michael</namePart>
<namePart type="family">Rusinowitch</namePart>
<affiliation>LORIA-INRIA-Lorraine, Nancy, France</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Mathieu</namePart>
<namePart type="family">Turuani</namePart>
<affiliation>LORIA-INRIA-Lorraine, Nancy, France</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Luca</namePart>
<namePart type="family">Viganò</namePart>
<affiliation>Institut für Informatik, Universität Freiburg, Germany</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Laurent</namePart>
<namePart type="family">Vigneron</namePart>
<affiliation>LORIA-INRIA-Lorraine, Nancy, France</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<genre displayLabel="OriginalPaper" authority="ISTEX" authorityURI="https://content-type.data.istex.fr" type="conference" valueURI="https://content-type.data.istex.fr/ark:/67375/XTP-BFHXPBJJ-3">conference</genre>
<originInfo>
<publisher>Springer Berlin Heidelberg</publisher>
<place>
<placeTerm type="text">Berlin, Heidelberg</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2002</dateIssued>
<copyrightDate encoding="w3cdtf">2002</copyrightDate>
</originInfo>
<language>
<languageTerm type="code" authority="rfc3066">en</languageTerm>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<abstract lang="en">Abstract: We introduce AVISS, a tool for security protocol analysis that supports the integration of back-ends implementing different search techniques, allowing for their systematic and quantitative comparison and paving the way to their effective interaction. As a significant example, we have implemented three back-ends, and used the AVISS tool to analyze and find flaws in 36 protocols, including 31 problems in the Clark-Jacob’s protocol library and a previously unreported flaw in the Denning-Sacco protocol.</abstract>
<relatedItem type="host">
<titleInfo>
<title>Computer Aided Verification</title>
<subTitle>14th International Conference, CAV 2002 Copenhagen, Denmark, July 27–31, 2002 Proceedings</subTitle>
</titleInfo>
<name type="personal">
<namePart type="given">Ed</namePart>
<namePart type="family">Brinksma</namePart>
<affiliation>Department of Computer Science, University of Twente, P. O. Box 217, 7500 AE, Enschede, The Netherlands</affiliation>
<affiliation>E-mail: brinksma@cs.utwente.nl</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Kim</namePart>
<namePart type="given">Guldstrand</namePart>
<namePart type="family">Larsen</namePart>
<affiliation>Department of Computer Science, Aalborg University, Fredrik Bajers Vej 7, 9220, Aalborg Ø, Denmark</affiliation>
<affiliation>E-mail: kgl@cs.auc.dk</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<genre type="book-series" authority="ISTEX" authorityURI="https://publication-type.data.istex.fr" valueURI="https://publication-type.data.istex.fr/ark:/67375/JMC-0G6R5W5T-Z">book-series</genre>
<originInfo>
<publisher>Springer</publisher>
<copyrightDate encoding="w3cdtf">2002</copyrightDate>
<issuance>monographic</issuance>
</originInfo>
<subject>
<genre>Book-Subject-Collection</genre>
<topic authority="SpringerSubjectCodes" authorityURI="SUCO11645">Computer Science</topic>
</subject>
<subject>
<genre>Book-Subject-Group</genre>
<topic authority="SpringerSubjectCodes" authorityURI="I">Computer Science</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I1603X">Logics and Meanings of Programs</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I14029">Software Engineering</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I16048">Mathematical Logic and Formal Languages</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I21017">Artificial Intelligence (incl. Robotics)</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I13030">Special Purpose and Application-Based Systems</topic>
</subject>
<identifier type="DOI">10.1007/3-540-45657-0</identifier>
<identifier type="ISBN">978-3-540-43997-4</identifier>
<identifier type="eISBN">978-3-540-45657-5</identifier>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="BookTitleID">72662</identifier>
<identifier type="BookID">3-540-45657-0</identifier>
<identifier type="BookChapterCount">51</identifier>
<identifier type="BookVolumeNumber">2404</identifier>
<identifier type="BookSequenceNumber">2404</identifier>
<identifier type="PartChapterCount">6</identifier>
<part>
<date>2002</date>
<detail type="part">
<title>Tool Presentations</title>
</detail>
<detail type="volume">
<number>2404</number>
<caption>vol.</caption>
</detail>
<extent unit="pages">
<start>349</start>
<end>354</end>
</extent>
</part>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2002</recordOrigin>
</recordInfo>
</relatedItem>
<relatedItem type="series">
<titleInfo>
<title>Lecture Notes in Computer Science</title>
</titleInfo>
<name type="personal">
<namePart type="given">Gerhard</namePart>
<namePart type="family">Goos</namePart>
<affiliation>Karlsruhe University, Germany</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Juris</namePart>
<namePart type="family">Hartmanis</namePart>
<affiliation>Cornell University, NY, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jan</namePart>
<namePart type="family">van Leeuwen</namePart>
<affiliation>Utrecht University, The Netherlands</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<originInfo>
<publisher>Springer</publisher>
<copyrightDate encoding="w3cdtf">2002</copyrightDate>
<issuance>serial</issuance>
</originInfo>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="SeriesID">558</identifier>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2002</recordOrigin>
</recordInfo>
</relatedItem>
<identifier type="istex">9DFCCDE838AB8BE098C6BA03ABFA04E8C0E8E987</identifier>
<identifier type="ark">ark:/67375/HCB-9WBPRPG0-H</identifier>
<identifier type="DOI">10.1007/3-540-45657-0_27</identifier>
<identifier type="ChapterID">27</identifier>
<identifier type="ChapterID">Chap27</identifier>
<accessCondition type="use and reproduction" contentType="copyright">Springer-Verlag Berlin Heidelberg, 2002</accessCondition>
<recordInfo>
<recordContentSource authority="ISTEX" authorityURI="https://loaded-corpus.data.istex.fr" valueURI="https://loaded-corpus.data.istex.fr/ark:/67375/XBH-RLRX46XW-4">springer</recordContentSource>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2002</recordOrigin>
</recordInfo>
</mods>
<json:item>
<extension>json</extension>
<original>false</original>
<mimetype>application/json</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-9WBPRPG0-H/record.json</uri>
</json:item>
</metadata>
</istex>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Istex/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 002504 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Corpus/biblio.hfd -nk 002504 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    Istex
   |étape=   Corpus
   |type=    RBID
   |clé=     ISTEX:9DFCCDE838AB8BE098C6BA03ABFA04E8C0E8E987
   |texte=   The AVISS Security Protocol Analysis Tool
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022