We apply model learning on three SSH implementations to infer state machine models, and then use model checking to verify that these models satisfy basic security properties and …
We propose a method for verifying the security of protocol implementations. Our method is based on declaring and enforcing invariants on the usage of cryptography. We develop …
In this paper we propose, design and evaluate a systematic directed fuzzing framework to automatically discover implementation bugs in arbitrary Bluetooth Classic (BT) devices. The …
Different implementations of the same protocol specification usually contain deviations, ie, differences in how they check and process some of their inputs. Deviations are commonly …
HK Lim, JB Kim, K Kim, YG Hong, YH Han - Applied Sciences, 2019 - mdpi.com
Recently, with the advent of various Internet of Things (IoT) applications, a massive amount of network traffic is being generated. A network operator must provide different quality of …
M Aizatulin, AD Gordon, J Jürjens - … of the 18th ACM conference on …, 2011 - dl.acm.org
Consider the problem of verifying security properties of a cryptographic protocol coded in C. We propose an automatic solution that needs neither a pre-existing protocol description nor …
S Chaki, A Datta - 2009 22nd IEEE Computer Security …, 2009 - ieeexplore.ieee.org
We present ASPIER-the first framework that combines software model checking with a standard protocol security model to automatically analyze authentication and secrecy …
Implementations of network protocols, such as DNS, DHCP and Zeroconf, are prone to flaws, security vulnerabilities and interoperability issues caused by developer mistakes and …
K Kim, JH Lee, HK Lim, SW Oh… - Computer Science and …, 2022 - doiserbia.nb.rs
This paper proposes a deep recurrent neural network (RNN)-based traffic classification scheme (deep RNN-TCS) for classifying applications from traffic patterns in a hybrid edge …