The scyther tool: Verification, falsification, and analysis of security protocols - Tool paper

<p>With the rise of the Internet and other open networks, a large number of security protocols have been developed and deployed in order to provide secure communication. The analysis of such security protocols has turned out to be extremely diffocult for humans, as witnessed by the fact that m...

Full description

Bibliographic Details
Main Author: Cremers, C
Format: Book section
Published: Springer 2008
_version_ 1797074452101464064
author Cremers, C
author_facet Cremers, C
author_sort Cremers, C
collection OXFORD
description <p>With the rise of the Internet and other open networks, a large number of security protocols have been developed and deployed in order to provide secure communication. The analysis of such security protocols has turned out to be extremely diffocult for humans, as witnessed by the fact that many protocols were found to be awed after deployment. This has driven the research in formal analysis of security protocols. Unfortunately, there are no effective approaches yet for constructing correct and efficient protocols, and work on concise formal logics that might allow one to easily prove that a protocol is correct in a formal model, is still ongoing. The most effective approach so far has been automated falsification or verification of such protocols with state-of-the-art tools such as ProVerif [1] or the Avispa tools [2]. These tools have shown to be effective at finding attacks on protocols (Avispa) or establishing correctness of protocols (ProVerif ).</p> <p>With the rise of the Internet and other open networks, a large number of security protocols have been developed and deployed in order to provide secure communication. The analysis of such security protocols has turned out to be extremely difficult for humans, as witnessed by the fact that many protocols were found to be awed after deployment. This has driven the research in formal analysis of security protocols. Unfortunately, there are no effective approaches yet for constructing correct and efficient protocols, and work on concise formal logics that might allow one to easily prove that a protocol is correct in a formal model, is still ongoing. The most effective approach so far has been automated falsification or verification of such protocols with state-of-the-art tools such as ProVerif [1] or the Avispa tools [2]. These tools have shown to be effective at finding attacks on protocols (Avispa) or establishing correctness of protocols (ProVerif ).</p> <p>Scyther is based on a pattern refinement algorithm, providing concise representations of (infinite) sets of traces. This allows the tool to assist in the analysis of classes of attacks and possible protocol behaviours, or to prove correctness for an unbounded number of protocol sessions. The tool has been successfully applied in both research and teaching.</p>
first_indexed 2024-03-06T23:36:22Z
format Book section
id oxford-uuid:6dcd4806-2d6e-4c06-82aa-83174cb9d2ba
institution University of Oxford
last_indexed 2024-03-06T23:36:22Z
publishDate 2008
publisher Springer
record_format dspace
spelling oxford-uuid:6dcd4806-2d6e-4c06-82aa-83174cb9d2ba2022-03-26T19:20:08ZThe scyther tool: Verification, falsification, and analysis of security protocols - Tool paperBook sectionhttp://purl.org/coar/resource_type/c_3248uuid:6dcd4806-2d6e-4c06-82aa-83174cb9d2baSymplectic Elements at OxfordSpringer2008Cremers, C<p>With the rise of the Internet and other open networks, a large number of security protocols have been developed and deployed in order to provide secure communication. The analysis of such security protocols has turned out to be extremely diffocult for humans, as witnessed by the fact that many protocols were found to be awed after deployment. This has driven the research in formal analysis of security protocols. Unfortunately, there are no effective approaches yet for constructing correct and efficient protocols, and work on concise formal logics that might allow one to easily prove that a protocol is correct in a formal model, is still ongoing. The most effective approach so far has been automated falsification or verification of such protocols with state-of-the-art tools such as ProVerif [1] or the Avispa tools [2]. These tools have shown to be effective at finding attacks on protocols (Avispa) or establishing correctness of protocols (ProVerif ).</p> <p>With the rise of the Internet and other open networks, a large number of security protocols have been developed and deployed in order to provide secure communication. The analysis of such security protocols has turned out to be extremely difficult for humans, as witnessed by the fact that many protocols were found to be awed after deployment. This has driven the research in formal analysis of security protocols. Unfortunately, there are no effective approaches yet for constructing correct and efficient protocols, and work on concise formal logics that might allow one to easily prove that a protocol is correct in a formal model, is still ongoing. The most effective approach so far has been automated falsification or verification of such protocols with state-of-the-art tools such as ProVerif [1] or the Avispa tools [2]. These tools have shown to be effective at finding attacks on protocols (Avispa) or establishing correctness of protocols (ProVerif ).</p> <p>Scyther is based on a pattern refinement algorithm, providing concise representations of (infinite) sets of traces. This allows the tool to assist in the analysis of classes of attacks and possible protocol behaviours, or to prove correctness for an unbounded number of protocol sessions. The tool has been successfully applied in both research and teaching.</p>
spellingShingle Cremers, C
The scyther tool: Verification, falsification, and analysis of security protocols - Tool paper
title The scyther tool: Verification, falsification, and analysis of security protocols - Tool paper
title_full The scyther tool: Verification, falsification, and analysis of security protocols - Tool paper
title_fullStr The scyther tool: Verification, falsification, and analysis of security protocols - Tool paper
title_full_unstemmed The scyther tool: Verification, falsification, and analysis of security protocols - Tool paper
title_short The scyther tool: Verification, falsification, and analysis of security protocols - Tool paper
title_sort scyther tool verification falsification and analysis of security protocols tool paper
work_keys_str_mv AT cremersc thescythertoolverificationfalsificationandanalysisofsecurityprotocolstoolpaper
AT cremersc scythertoolverificationfalsificationandanalysisofsecurityprotocolstoolpaper