• Datalog

  • Referenced in 283 articles [sw20023]
  • data integration, information extraction, networking, program analysis, security, and cloud computing.[1] Its origins date...
  • Casper

  • Referenced in 95 articles [sw06559]
  • Compiler for the Analysis of Security Protocols. Casper is a program that will take...
  • SWIFFT

  • Referenced in 46 articles [sw11588]
  • confusion.” We provide a detailed security analysis of concrete instantiations, and give a high-performance ... having comparable efficiency) by a supporting asymptotic security proof: it can be formally proved that...
  • OFMC

  • Referenced in 27 articles [sw09466]
  • fixed-point model checker for symbolic analysis of security protocols. We introduce the open-source ... point model checker OFMC for symbolic security protocol analysis, which extends ... reduction. Moreover, OFMC allows one to analyze security protocols with respect to an algebraic theory...
  • tweakey

  • Referenced in 23 articles [sw12816]
  • round). Increasing the sizes renders the security analysis very difficult and thus we identify ... this construction allows a significant increase of security of well-known authenticated encryptions mode like...
  • scyther

  • Referenced in 16 articles [sw09467]
  • scyther tool: verification, falsification, and analysis of security protocols. With the rise of the Internet ... deployed in order to provide secure communication. The analysis of such security protocols has turned ... driven the research in formal analysis of security protocols. Unfortunately, there are no effective approaches...
  • spongent

  • Referenced in 18 articles [sw08445]
  • trade-offs. We furthermore present a security analysis of spongent. Basing the design ... present-type primitive provides confidence in its security with respect to the most important attacks...
  • AVISPA

  • Referenced in 86 articles [sw03172]
  • formal language for specifying protocols and their security properties, and integrates different back-ends that ... variety of state-of-the-art automatic analysis techniques...
  • Rabbit

  • Referenced in 18 articles [sw08372]
  • processor. We have performed detailed security analysis, in particular, correlation analysis and algebraic investigations...
  • TAMARIN

  • Referenced in 15 articles [sw23438]
  • TAMARIN prover for the symbolic analysis of security protocols. The Tamarin prover supports the automated ... unbounded, symbolic analysis of security protocols. It features expressive languages for specifying protocols, adversary models...
  • BitBlaze

  • Referenced in 11 articles [sw10059]
  • BitBlaze: Binary Analysis for Computer Security: Binary analysis is imperative for protecting COTS (common ... binary analysis, which provides sound and effective solutions to applications beyond software security and malicious ... applying the BitBlaze Binary Analysis Platform to real security problems. The two research focii drive ... each other: as new security problems arise, we develop new analysis techniques. Similarly, we develop...
  • Interrogator

  • Referenced in 11 articles [sw36025]
  • model. The Interrogator is a protocol security analysis tool implemented in Prolog and based...
  • FIREMAN

  • Referenced in 7 articles [sw10594]
  • toolkit for firewall modeling and analysis. Security concerns are becoming increasingly critical in networked systems ... weaken the desired security. This paper introduces FIREMAN, a static analysis toolkit for firewall modeling...
  • ASASP

  • Referenced in 5 articles [sw06350]
  • ASASP: automated symbolic analysis of security policies. We describe asasp, a symbolic reachability procedure ... analysis of administrative access control policies. The tool represents access policies and their administrative actions ... symbolic reachability procedure to solve security analysis problems. Checks for fix-point-reduced to satisfiability...
  • MCBC

  • Referenced in 6 articles [sw03323]
  • this paper, we have provided simple security analysis of these online ciphers. We have also ... proposed two new more efficient chosen ciphertext secure online ciphers modified-HCBC (MHCBC) and modified...
  • QUAIL

  • Referenced in 3 articles [sw19647]
  • QUAIL : A Quantitative Security Analyzer. Quantitative security analysis evaluates and compares how effectively a system ... perform an arbitrary-precision quantitative analysis of the security of a system depending on private ... examples and show that QUAIL’s security analysis is more accurate and revealing than results...
  • AEGIS

  • Referenced in 4 articles [sw13246]
  • uses six AES round functions. The security analysis shows that both algorithms offer a high...
  • ADTool

  • Referenced in 3 articles [sw11973]
  • ADTool: Security Analysis with Attack–Defense Trees. ADTool is free, open source software assisting graphical ... modeling and quantitative analysis of security, using attack–defense trees. The main features of ADTool...
  • MOPS

  • Referenced in 23 articles [sw10117]
  • formal approach for finding bugs in security-relevant software and verifying their absence. The idea ... expensive, we have built a program analysis tool to automate this process. Our program ... analysis models the program to be verified as a pushdown automaton, represents the security property...
  • Z3str2

  • Referenced in 3 articles [sw30520]
  • essential component in many formal verification, security analysis, and bug-finding tools. Such solvers typically...