The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
- A. Armando, D. Basin, L. Vigneron
- Computer ScienceInternational Conference on Computer Aided…
- 6 July 2005
AVISPA is a push-button tool for the automated validation of Internet security-sensitive protocols and applications. It provides a modular and expressive formal language for specifying protocols and…
Automated Security Protocol Analysis With the AVISPA Tool
- L. Viganò
- Computer ScienceMathematical Foundations of Programming Semantics
- 1 May 2006
OFMC: A symbolic model checker for security protocols
- D. Basin, S. Mödersheim, L. Viganò
- Computer ScienceInternational Journal of Information Security
- 1 June 2005
The on-the-fly model checker OFMC is presented, a tool that combines two ideas for analyzing security protocols based on lazy, demand-driven search and the integration of symbolic techniques and optimizations for modeling a lazy Dolev–Yao intruder whose actions are generated in a demand- driven way.
OFMC: A Symbolic Model-Checker for Security Protocols
- D. Basin, S. Mödersheim, L. Viganò
- Computer Science
- 2004
We present the on-the-fly model checker OFMC, a tool that combines two ideas for analyzing security protocols based on lazy, demand-driven search. The first is the use of lazy data types as a simple…
An On-the-Fly Model-Checker for Security Protocol Analysis
- D. Basin, S. Mödersheim, L. Viganò
- Computer ScienceEuropean Symposium on Research in Computer…
- 13 October 2003
The on-the-fly model-checker OFMC is introduced, a tool that combines two methods for analyzing security protocols, the use of lazy data-types and the integration of symbolic techniques for modeling a Dolev-Yao intruder, whose actions are generated in a demand-driven way.
Labelled non-classical logics
- L. Viganò
- Computer Science
- 31 January 2000
This work labels natural Deduction Systems for Propositional Modal Logics and Sequent Systems for Non-Classical Logics as follows: K, T, K4 and S4, and discusses substructural and complexity analysis of modal sequent systems.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
- O. Almousa, S. Mödersheim, P. Modesti, L. Viganò
- Computer ScienceEuropean Symposium on Research in Computer…
- 18 November 2015
Model Checking Ad Hoc Network Routing Protocols: ARAN vs. endairA
- Davide Benetti, Massimo Merro, L. Viganò
- Computer ScienceIEEE International Conference on Software…
- 13 September 2010
By model checking ARAN with the AVISPA Tool, this paper has discovered three attacks (a route disruption, a route diversion, and a creation of incorrect routing state), while the analysis of end air A revealed no attacks.
Explainable Security
- L. Viganò, D. Magazzeni
- Computer ScienceIEEE European Symposium on Security and Privacy…
- 11 July 2018
This paper discusses the "Six Ws" of XSec and argues that XSec has unique and complex characteristics, and defines a roadmap for XSec that identifies several possible research directions.
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
- S. Mödersheim, L. Viganò
- Computer Science, MathematicsFoundations of Security Analysis and Design
- 10 August 2009
The Open-source Fixed-point Model checker OFMC is introduced, which extends the On-the-fly Model Checker (the previous OFMC), and allows one to analyze security protocols with respect to an algebraic theory of the employed cryptographic operators, which can be specified as part of the input.
...
...