Skip to main content

Table 2 Differences between AVISPA and Scyther tool

From: Trusted service manager (TSM) based privacy preserving and secure mobile commerce framework with formal verification

AVISPA tool (Armando 2005)

Scyther tool (Cremers 2006; Cremers et al. 2009)

High level protocol specification language (HLPSL) is used

Security protocol description language (SPDL) is used

Multi-protocol attacks are not verified

Multi-protocol attacks are verified

Attack graphs are not generated

When attacks are found, attack graphs are generated

Verification of protocols is done using only bounded number of sessions

Verification of protocols is done by bounded/unbounded number of sessions

Assumes that every protocol runs in isolation

Assumes that each protocol runs with other protocols in the same network