{SweynTooth}: unleashing mayhem over Bluetooth low energy

ME Garbelini, C Wang, S Chattopadhyay… - 2020 USENIX Annual …, 2020 - usenix.org
The Bluetooth Low Energy (BLE) is a promising short-range communication technology for
Internet-of-Things (IoT) with reduced energy consumption. Vendors implement BLE …

Model learning and model checking of SSH implementations

P Fiterău-Broştean, T Lenaerts, E Poll… - Proceedings of the 24th …, 2017 - dl.acm.org
We apply model learning on three SSH implementations to infer state machine models, and
then use model checking to verify that these models satisfy basic security properties and …

Modular verification of security protocol code by typing

K Bhargavan, C Fournet, AD Gordon - ACM Sigplan Notices, 2010 - dl.acm.org
We propose a method for verifying the security of protocol implementations. Our method is
based on declaring and enforcing invariants on the usage of cryptography. We develop …

{BrakTooth}: Causing havoc on bluetooth link manager via directed fuzzing

ME Garbelini, V Bedi, S Chattopadhyay, S Sun… - 31st USENIX Security …, 2022 - usenix.org
In this paper we propose, design and evaluate a systematic directed fuzzing framework to
automatically discover implementation bugs in arbitrary Bluetooth Classic (BT) devices. The …

[PDF][PDF] Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation.

D Brumley, J Caballero, Z Liang, J Newsome… - USENIX Security …, 2007 - usenix.org
Different implementations of the same protocol specification usually contain deviations, ie,
differences in how they check and process some of their inputs. Deviations are commonly …

Payload-based traffic classification using multi-layer lstm in software defined networks

HK Lim, JB Kim, K Kim, YG Hong, YH Han - Applied Sciences, 2019 - mdpi.com
Recently, with the advent of various Internet of Things (IoT) applications, a massive amount
of network traffic is being generated. A network operator must provide different quality of …

Extracting and verifying cryptographic models from C protocol code by symbolic execution

M Aizatulin, AD Gordon, J Jürjens - … of the 18th ACM conference on …, 2011 - dl.acm.org
Consider the problem of verifying security properties of a cryptographic protocol coded in C.
We propose an automatic solution that needs neither a pre-existing protocol description nor …

ASPIER: An automated framework for verifying security protocol implementations

S Chaki, A Datta - 2009 22nd IEEE Computer Security …, 2009 - ieeexplore.ieee.org
We present ASPIER-the first framework that combines software model checking with a
standard protocol security model to automatically analyze authentication and secrecy …

SymbexNet: Testing Network Protocol Implementations with Symbolic Execution and Rule-Based Specifications

JS Song, C Cadar, P Pietzuch - IEEE Transactions on Software …, 2014 - ieeexplore.ieee.org
Implementations of network protocols, such as DNS, DHCP and Zeroconf, are prone to
flaws, security vulnerabilities and interoperability issues caused by developer mistakes and …

Deep RNN-based network traffic classification scheme in edge computing system

K Kim, JH Lee, HK Lim, SW Oh… - Computer Science and …, 2022 - doiserbia.nb.rs
This paper proposes a deep recurrent neural network (RNN)-based traffic classification
scheme (deep RNN-TCS) for classifying applications from traffic patterns in a hybrid edge …