A comparative study of security protocols validation tools: HERMES vs. AVISPA

被引:0
|
作者
Hussain, M [1 ]
Seret, D [1 ]
机构
[1] Univ Rene Descartes Paris5, UFR Math Info, 45 Rue St Peres, F-75270 Paris 06, France
关键词
formal validation; security protocols; Hermes; AVISPA; EVA; HLPSL;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security protocols require more rigorous and detailed verification than normal communication protocols before their deployment because even a trivial flaw in their architecture may produce drastic results. These verification procedures are based upon the abstract formal methods producing analytical rules to show if a given protocol is secure or not. The technical difficulties to master formal techniques by non-mathematicians have given rise to online validation tools which are easy to use and produce a human readable output. These online tools differ in many parameters. Our work is aimed to present a qualitative comparison of two automatic security protocol analysers Hermes and AVISPA for the some pertinent parameters.
引用
收藏
页码:U303 / U308
页数:6
相关论文
共 50 条
  • [1] The AVISPA tool for the automated validation of Internet security protocols and applications
    Armando, A
    Basin, D
    Boichut, Y
    Chevalier, Y
    Compagna, L
    Cuellar, J
    Drielsma, PH
    Heám, PC
    Kouchnarenko, O
    Mantovani, J
    Mödersheim, S
    von Oheimb, D
    Rusinowitch, M
    Santiago, J
    Turuani, M
    Viganò, L
    Vigneron, L
    [J]. COMPUTER AIDED VERIFICATION, PROCEEDINGS, 2005, 3576 : 281 - 285
  • [2] Android vs. iOS Security: A Comparative Study
    Mohamed, Ibtisam
    Patel, Dhiren
    [J]. 2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 725 - 730
  • [3] A comparative study of RFID solutions for security and privacy: POP vs. previous solutions
    Koralalage, K. H. S. Sabaragamu
    Cheng, Jingde
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 342 - 349
  • [4] Comparative Study of Security Protocols to Enhance Security over Internet
    Prachi
    Dewan, Surbhi
    Pratibha
    [J]. 2015 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES ACCT 2015, 2015, : 552 - 556
  • [5] Comparative study of xAPI validation tools
    Rabelo, Thomas
    Lama, Manuel
    Vidal, Juan C.
    Amorim, Ricardo
    [J]. 2017 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE), 2017,
  • [6] Cartesian vs. Radial - A Comparative Evaluation of Two Visualization Tools
    Burch, Michael
    Bott, Felix
    Beck, Fabian
    Diehl, Stephan
    [J]. ADVANCES IN VISUAL COMPUTING, PT I, PROCEEDINGS, 2008, 5358 : 151 - 160
  • [7] A Comparative Study: MongoDB vs. MySQL
    Gyorodi, Cornelia
    Gyorodi, Robert
    Pecherle, George
    Olah, Andrada
    [J]. 2015 13TH INTERNATIONAL CONFERENCE ON ENGINEERING OF MODERN ELECTRIC SYSTEMS (EMES), 2015,
  • [8] Eigenfaces vs. Fisherfaces vs. ICA for Face Recognition; A Comparative Study
    Sharkas, M.
    Abou Elenien, M.
    [J]. ICSP: 2008 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-5, PROCEEDINGS, 2008, : 914 - 919
  • [9] Phone vs. Tangible in Museums: A Comparative Study
    Petrelli, Daniela
    O'Brien, Sinead
    [J]. PROCEEDINGS OF THE 2018 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2018), 2018,
  • [10] Amoxapine as an antipsychotic: A comparative study vs. haloperidol
    Chaudhry, IB
    Husain, N
    Khan, S
    Deakin, JFW
    Kapur, S
    [J]. SCHIZOPHRENIA RESEARCH, 2006, 81 : 78 - 78