User ’ s Guide for the LySatool version 2 . 01
暂无分享,去创建一个
The LySatool [4] implements a security analysis for the process calculus LySa. This calculus comprises language primitives for modelling of network communication that achieves security by applying cryptographic techniques. The analysis is an over-approximating program analysis that can guarantee confidentiality and authentication properties for LySa processes — even when these are under attack from arbitrary network attackers. This user’s guide explains how to operate the LySatool. However, it does not explain how the analysis works nor does it give the necessary insight to interpret the analysis result. The user is referred to other published material on these matters. For example, LySa and the analysis are described in [1]. The main novelty of version 2 of the LySatool is an addition of an analysable meta-level, which is described in [3]. Further details on the correctness of the various features implemented in LySatool version 2 may be found in [2].
[1] Flemming Nielson,et al. Automated Analysis of Security in Networking Systems , 2004 .
[2] Mikael Buchholtz. Automated Analysis of Infinite Scenarios , 2005, TGC.
[3] Flemming Nielson,et al. Static validation of security protocols , 2005, J. Comput. Secur..