Formal verification of security protocol implementations: a survey

M Avalle, A Pironti, R Sisto - Formal Aspects of Computing, 2014 - Springer
Automated formal verification of security protocols has been mostly focused on analyzing
high-level abstract models which, however, are significantly different from real protocol …

Protocol state fuzzing of {TLS} implementations

J De Ruiter, E Poll - 24th USENIX Security Symposium (USENIX Security …, 2015 - usenix.org
We describe a largely automated and systematic analysis of TLS implementations by what
we call 'protocol state fuzzing': we use state machine learning to infer state machines from …

[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

On the security of TLS-DHE in the standard model

T Jager, F Kohlar, S Schäge, J Schwenk - … , CA, USA, August 19-23, 2012 …, 2012 - Springer
TLS is the most important cryptographic protocol in use today. However, up to now there is
no complete cryptographic security proof in the standard model, nor in any other model. We …

Implementing TLS with verified cryptographic security

K Bhargavan, C Fournet, M Kohlweiss… - … IEEE Symposium on …, 2013 - ieeexplore.ieee.org
TLS is possibly the most used protocol for secure communications, with a 18-year history of
flaws and fixes, ranging from its protocol logic to its cryptographic design, and from the …

Cryptographically verified implementations for TLS

K Bhargavan, C Fournet, R Corin… - Proceedings of the 15th …, 2008 - dl.acm.org
We intend to narrow the gap between concrete implementations of cryptographic protocols
and their verified models. We develop and verify a small functional implementation of the …

Exploiting dissent: towards fuzzing-based differential black-box testing of TLS implementations

A Walz, A Sikora - IEEE Transactions on Dependable and …, 2017 - ieeexplore.ieee.org
The Transport Layer Security (TLS) protocol is one of the most widely used security
protocols on the internet. Yet do implementations of TLS keep on suffering from bugs and …

Universally composable security analysis of TLS

S Gajek, M Manulis, O Pereira, AR Sadeghi… - … 2008, Shanghai, China …, 2008 - Springer
We present a security analysis of the complete TLS protocol in the Universal Composable
security framework. This analysis evaluates the composition of key exchange functionalities …

Inferring OpenVPN state machines using protocol state fuzzing

LA Daniel, E Poll, J de Ruiter - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
The reliability of a security protocol is of the utmost importance but can easily be
compromised by a vulnerability in the implementation. A crucial aspect of an implementation …

Some tips on writing proof scores in the OTS/CafeOBJ method

K Ogata, K Futatsugi - … , Meaning, and Computation: Essays dedicated to …, 2006 - Springer
The OTS/CafeOBJ method is an instance of the proof score approach to systems analysis,
which has been mainly devoted by researchers in the OBJ community. We describe some …