Efficient Symbolic Execution for Analysing Cryptographic Protocol Implementations
暂无分享,去创建一个
[1] Cédric Fournet,et al. Cryptographically verified implementations for TLS , 2008, CCS.
[2] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[3] Stéphanie Delaune,et al. Computing Knowledge in Security Protocols under Convergent Equational Theories , 2009, CADE.
[4] Stéphanie Delaune,et al. Computing Knowledge in Security Protocols Under Convergent Equational Theories , 2010, Journal of Automated Reasoning.
[5] James C. King,et al. Symbolic execution and program testing , 1976, CACM.
[6] Zhenkai Liang,et al. BitBlaze: A New Approach to Computer Security via Binary Analysis , 2008, ICISS.
[7] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[8] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[9] Jan Jürjens,et al. Security Analysis of Crypto-based Java Programs using Automated Theorem Provers , 2006, 21st IEEE/ACM International Conference on Automated Software Engineering (ASE'06).
[10] Simon S. Lam,et al. A semantic model for authentication protocols , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[11] D. Wagner,et al. Catchconv : Symbolic execution and run-time type inference for integer conversion errors , 2007 .
[12] Ricardo Corin,et al. Analysis Models for Security Protocols , 2006 .
[13] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[14] Úlfar Erlingsson,et al. Engineering Secure Software and Systems , 2011, Lecture Notes in Computer Science.
[15] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.
[16] Alfredo Pironti,et al. Formally-Based Black-Box Monitoring of Security Protocols , 2010, ESSoS.
[17] Bruno Blanchet,et al. A Computationally Sound Mechanized Prover for Security Protocols , 2008, IEEE Transactions on Dependable and Secure Computing.