Lessons learned in the analysis of the EMV and TLS security protocols
暂无分享,去创建一个
[1] Tsun S. Chow,et al. Testing Software Design Modeled by Finite-State Machines , 1978, IEEE Transactions on Software Engineering.
[2] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[3] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[4] Dana Angluin,et al. Learning Regular Sets from Queries and Counterexamples , 1987, Inf. Comput..
[5] Gavin Lowe,et al. An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..
[6] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[7] Daniel Bleichenbacher,et al. Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1 , 1998, CRYPTO.
[8] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[9] Lawrence C. Paulson,et al. Inductive analysis of the Internet protocol TLS , 1999, TSEC.
[10] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[11] Martín Abadi,et al. Analyzing security protocols with secrecy types and logic programs , 2002, POPL '02.
[12] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[13] Oliver Niese,et al. An integrated approach to testing complex systems , 2003 .
[14] Lionel Mamane,et al. Interactive mathematical documents: creation and presentation , 2004 .
[15] Gregorio Díaz,et al. Automatic verification of the TLS handshake protocol , 2004, SAC '04.
[16] Thomas Bäck,et al. Mixed-integer evolution strategies for parameter optimization and their applications to medical image analysis , 2005 .
[17] John C. Mitchell,et al. A modular correctness proof of IEEE 802.11i and TLS , 2005, CCS '05.
[18] B. Lijnse,et al. TOP to the rescue. Task-oriented programming for incident response applications , 2005 .
[19] Bruno Blanchet,et al. Reconstruction of attacks against cryptographic protocols , 2005, 18th IEEE Computer Security Foundations Workshop (CSFW'05).
[20] Kazuhiro Ogata,et al. Equational Approach to Formal Analysis of TLS , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[21] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.
[22] Andrew D. Gordon,et al. Verified Interoperable Implementations of Security Protocols , 2006, CSFW.
[23] David Naccache,et al. The Sorcerer's Apprentice Guide to Fault Attacks , 2006, Proceedings of the IEEE.
[24] Steven J. Murdoch,et al. Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks , 2007, USENIX Security Symposium.
[25] M. D. Berg,et al. Optimal Geometric Data Structures , 2007 .
[26] Farhad Arbab,et al. Model Checking of Component Connectors , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
[27] Michael Baentsch,et al. The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks , 2008, TRUST.
[28] Steven J. Murdoch,et al. Thinking Inside the Box: System-Level Failures of Tamper Proofing , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[29] Fingerprinting Passports , 2008 .
[30] Ahmad-Reza Sadeghi,et al. Universally Composable Security Analysis of TLS , 2008, ProvSec.
[31] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[32] Cédric Fournet,et al. Cryptographically verified implementations for TLS , 2008, CCS.
[33] Seyyed Hamed Hashemi,et al. Studies on verification of wireless sensor networks and abstraction learning for system inference , 2008 .
[34] Hugo Jonker,et al. Security matters : privacy in voting and fairness in digital exchange , 2009 .
[35] M. J. de Mol,et al. Reasoning about functional programs : Sparkle, a proof assistant for Clean , 2009 .
[36] Oscar H. Ibarra,et al. On spiking neural P systems , 2006, Natural Computing.
[37] Steven J. Murdoch,et al. Optimised to Fail: Card Readers for Online Banking , 2009, Financial Cryptography.
[38] van Mpwj Michiel Osch. Automated model-based testing of hybrid systems , 2009 .
[39] A. Rodriguez Yakushev,et al. Towards Getting Generic Programming Ready for Prime Time , 2009 .
[40] Bogdan Warinschi,et al. The TLS Handshake Protocol: A Modular Analysis , 2010, Journal of Cryptology.
[41] Mohammed G. Khatib. MEMS-Based Storage Devices : Integration in Energy-Constrained Mobile Systems , 2009 .
[42] J. Kwisthout,et al. The Computational Complexity of Probabilistic Networks , 2009 .
[43] Sebastiaan Gijsbert Marinus Cornelissen,et al. Evaluating Dynamic Analysis Techniques for Program Comprehension , 2009 .
[44] H. Hansen. Coalgebraic Modelling : Applications in Automata theory and Modal logic , 2009 .
[45] Marcel Verhoef,et al. Modeling and validating distributed embedded real-time control systems , 2009 .
[46] Tiziana Margaria,et al. LearnLib: a framework for extrapolating behavioral models , 2009, International Journal on Software Tools for Technology Transfer.
[47] Marcin Czenko,et al. TuLiP : reshaping trust management , 2009 .
[48] D. Costa. Formal models for component connectors , 2010 .
[49] Frits W. Vaandrager,et al. Inference and Abstraction of the Biometric Passport , 2010, ISoLA.
[50] Mike Bond,et al. 2010 IEEE Symposium on Security and Privacy Chip and PIN is Broken , 2022 .
[51] Mark de Berg,et al. Computing push plans for disk-shaped robots , 2010, 2010 IEEE International Conference on Robotics and Automation.
[52] Tom Staijen,et al. Graph-based Specification and Verification for Aspect-Oriented Languages , 2010 .
[53] J. Endrullis. Termination and Productivity , 2010 .
[54] C. J. Boogerd,et al. Focusing Automatic Code Inspections , 2010 .
[55] Ruth Breu,et al. A Classification for Model-Based Security Testing , 2011 .
[56] B. J. Arnoldus,et al. An illumination of the template enigma : software code generation with templates , 2011 .
[57] A. Morali,et al. IT architecture-based confidentiality risk assessment in networks of organizations , 2011 .
[58] Z Zvezdan Protic,et al. Configuration management for models : generic methods for model comparison and model co-evolution , 2011 .
[59] Hendrik Michaël van der Bijl,et al. On changing models in model-based testing , 2011 .
[60] Miguel E. Andrés,et al. Quantitative Analysis of Information Leakage in Probabilistic and Nondeterministic Systems , 2011, ArXiv.
[61] Sean Turner,et al. Prohibiting Secure Sockets Layer (SSL) Version 2.0 , 2011, RFC.
[62] Somayeh Malakuti Khah Olun Abadi. Event composition model: achieving naturalness in runtime enforcement , 2011 .
[63] van Pja Paul Tilburg. From computability to executability : a process-theoretic view on automata theory , 2011 .
[64] Jean-Pierre Szikora. Banques en ligne : à la découverte d'EMV-CAP , 2011 .
[65] Christian Krause,et al. Reconfigurable Component Connectors , 2011 .
[66] Lacramioara Astefanoaei,et al. An executable theory of multi-agent systems refinement , 2011 .
[67] Stephanie Kemper,et al. Modelling and analysis of real-time coordination patterns , 2011 .
[68] Gavin Lowe,et al. Analysing TLS in the strand spaces model , 2011, J. Comput. Secur..
[69] V. Laz. Faculty of Mathematics and Computer Science , 2011 .
[70] M Muhammad Atif,et al. Formal modeling and verification of distributed failure detectors , 2011 .
[71] Ronald Middelkoop,et al. Capturing and exploiting abstract views of states in OO verification , 2011 .
[72] Joeri de Ruiter,et al. Formal Analysis of the EMV Protocol Suite , 2011, TOSCA.
[73] Lennart C. L. Kats,et al. Building Blocks for Language Workbenches , 2011 .
[74] Young-Joo Moon,et al. Stochastic models for quality of service of component connectors , 2011 .
[75] Emmanuele Zambon,et al. Towards optimal IT availability planning: methods and tools , 2011 .
[76] Bas Basten,et al. Ambiguity Detection for Programming Language Grammars , 2011 .
[77] Erik Poll,et al. Rigorous specifications of the SSH Transport Layer , 2011 .
[78] W. Kuijper. Compositional Synthesis of Safety Controllers , 2012 .
[79] Zef Hemel. Methods and Techniques for the Design and Implementation of Domain-Specific Languages , 2012 .
[80] Joeri de Ruiter,et al. The SmartLogic Tool: Analysing and Testing Smart Card Protocols , 2012, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation.
[81] Tibor Jager,et al. On the Security of TLS-DHE in the Standard Model , 2012, CRYPTO.
[82] Joeri de Ruiter,et al. Designed to Fail: A USB-Connected Reader for Online Banking , 2012, NordSec.
[83] Adriaan Middelkoop,et al. Inference of Program Properties with Attribute Grammars, Revisited , 2012 .
[84] D. E. Nadales Agut,et al. A Compositional Interchange Format for Hybrid Systems: Design and Implementation , 2012 .
[85] Ljp Luc Engelen. From napkin sketches to reliable software , 2012 .
[86] Saeed Sedghi,et al. Towards Provably Secure Efficiently Searchable Encryption , 2012 .
[87] Fpm Frank Stappers. Bridging formal models : an engineering perspective , 2012 .
[88] Mark Ryan,et al. New privacy issues in mobile telephony: fix and verification , 2012, CCS.
[89] Sergey Bratus,et al. A Patch for Postel's Robustness Principle , 2012, IEEE Security & Privacy.
[90] Michael Tüxen,et al. Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) Heartbeat Extension , 2012, RFC.
[91] Kab Kevin Verbeek. Algorithms for cartographic visualization , 2012 .
[92] van Mf Marcel Amstel,et al. Assessing and improving the quality of model transformations , 2012 .
[93] Hossein Rahmani,et al. Analysis of protein-protein interaction networks by means of annotated graph mining algorithms , 2012 .
[94] Aah Ammar Osaiweran. Formal development of control software in the medical systems domain , 2012 .
[95] Joeri de Ruiter,et al. Model Checking under Fairness in ProB and Its Application to Fair Exchange Protocols , 2012, ICTAC.
[96] Trajce Dimkov,et al. Alignment of organizational security policies: Theory and Practice , 2012 .
[97] John Businge,et al. Co-evolution of the Eclipse SDK Framework and Its Third-Party Plug-Ins , 2013, 2013 17th European Conference on Software Maintenance and Reengineering.
[98] Joeri de Ruiter,et al. Formal Models of Bank Cards for Free , 2013, 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops.
[99] Joeri de Ruiter,et al. The Radboud Reader: A Minimal Trusted Smartcard Reader for Securing Online Transactions , 2013, IDMAN.
[100] Kenneth G. Paterson,et al. On the Security of the TLS Protocol: A Systematic Analysis , 2013, IACR Cryptol. ePrint Arch..
[101] Jja Jeroen Keiren,et al. Advanced reduction techniques for model checking , 2013 .
[102] M. S. Greiler,et al. Test Suite Comprehension for Modular and Dynamic Systems , 2013 .
[103] Mark Timmer,et al. Efficient modelling, generation and analysis of Markov automata , 2013 .
[104] L. Lensink,et al. Applying formal methods in software development , 2013 .
[105] Kenneth G. Paterson,et al. Lucky Thirteen: Breaking the TLS and DTLS Record Protocols , 2013, 2013 IEEE Symposium on Security and Privacy.
[106] Dhp Dirk Gerrits. Pushing and pulling : computing push plans for disk-shaped robots, and dynamic labelings for moving points , 2013 .
[107] Kenneth G. Paterson,et al. On the Security of RC4 in TLS , 2013, USENIX Security Symposium.
[108] Eduardo Zambon,et al. Abstract Graph Transformation - Theory and Practice , 2013 .
[109] Mjm Marcel Roeloffzen. Kinetic data structures in the black-box model , 2013 .
[110] Carst Tankink. Documentation and formal mathematics : web technology meets theorem proving , 2013 .
[111] van den,et al. Composition and synchronization of real-time components upon one processor , 2013 .
[112] Alfredo Pironti,et al. Implementing TLS with Verified Cryptographic Security , 2013, 2013 IEEE Symposium on Security and Privacy.
[113] Georgeta Igna,et al. Performance analysis of real-time task systems using timed automata , 2013 .
[114] Jörg Schwenk,et al. SoK: Lessons Learned from SSL/TLS Attacks , 2013, WISA.
[115] Gerhard de Koning Gans,et al. Outsmarting smart cards , 2013 .
[116] Sander van der Burg,et al. A Reference Architecture for Distributed Software Deployment , 2013 .
[117] Joeri de Ruiter. Automated algebraic analysis of structure-preserving signature schemes , 2014, IACR Cryptol. ePrint Arch..
[118] Michiel Helvensteijn,et al. Abstract delta modeling : software product lines and beyond , 2014 .
[119] Axel Belinfante,et al. JTorX: exploring model-based testing , 2014 .
[120] Bn Bogdan Vasilescu. Social aspects of collaboration in online software communities , 2014 .
[121] Vitaly Shmatikov,et al. Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations , 2014, 2014 IEEE Symposium on Security and Privacy.
[122] Joost Winter,et al. Coalgebraic Characterizations of Automata-Theoretic Classes , 2014 .
[123] Joeri de Ruiter,et al. Analysis of Secure Key Storage Solutions on Android , 2014, SPSM@CCS.
[124] Adrianus Johannus Paulus Jeckmans. Cryptographically-Enhanced Privacy for Recommender Systems , 2014 .
[125] Jm Jordi Breekel,et al. A security evaluation and proof-of-concept relay attack on Dutch EMV contactless transactions , 2014 .
[126] Marijn Paul Schraagen,et al. Aspects of record linkage , 2014 .
[127] Alfons Laarman,et al. Scalable multi-core model checking , 2014 .
[128] J. van den Bos,et al. Gathering evidence: Model-driven software engineering in automated digital forensics , 2014 .
[129] Frank W. Takes. Algorithms for analyzing and mining real-world graphs , 2014 .
[130] Joeri de Ruiter,et al. Automated Reverse Engineering using Lego® , 2014, WOOT.
[131] N Neda Noroozi,et al. Improving input-output conformance testing theories , 2014 .
[132] Pim Vullers,et al. Efficient implementations of attribute-based credentials on smart cards , 2014 .
[133] Cor-Paul Bezemer,et al. Performance Optimization of Multi-Tenant Software Systems , 2014 .
[134] Frank S. de Boer,et al. Combining Monitoring with Run-Time Assertion Checking , 2014, SFM.
[135] David A. Wheeler. Preventing Heartbleed , 2014, Computer.
[136] Mike Bond,et al. Chip and Skim: Cloning EMV Cards with the Pre-play Attack , 2012, 2014 IEEE Symposium on Security and Privacy.
[137] Fides Aarts,et al. Tomte : bridging the gap between active learning and real-world systems , 2014 .
[138] van der,et al. Domain specific languages and their type systems , 2014 .
[139] Wouter Meulemans,et al. Similarity measures and algorithms for cartographic schematization , 2014 .
[140] Erik Tews,et al. Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks , 2014, USENIX Security Symposium.
[141] Minh Tri Ngo,et al. Qualitative and Quantitative Information Flow Analysis for Multi-threaded Programs , 2014 .
[142] A. Narwade,et al. Faculty of Electrical Engineering, Mathematics and Computer Science , 2015 .
[143] Bengt Jonsson,et al. Generating models of infinite-state communication protocols using regular inference with abstraction , 2015, Formal Methods Syst. Des..
[144] Peter Sewell,et al. Not-quite-so-broken TLS: lessons in re-engineering a security protocol specification and implementation , 2015 .
[145] Peter Sewell,et al. Not-Quite-So-Broken TLS: Lessons in Re-Engineering a Security Protocol Specification and Implementation , 2015, USENIX Security Symposium.
[146] Anja Guzzi,et al. Supporting Developers' Teamwork from within the IDE , 2015 .
[147] Gergely Alpár,et al. Attribute-based identity management : [bridging the cryptographic design of ABCs with the real world] , 2015 .
[148] S Sjoerd Cranen,et al. Getting the point : obtaining and understanding fixpoints in model checking , 2015 .
[149] Rjm Rolf Theunissen. Supervisory control in health care systems , 2015 .
[150] T. V. Bui,et al. A software architecture for body area sensor networks : flexibility and trustworthiness , 2015 .
[151] Joeri de Ruiter,et al. Protocol State Fuzzing of TLS Implementations , 2015, USENIX Security Symposium.
[152] Alfredo Pironti,et al. A Messy State of the Union: Taming the Composite State Machines of TLS , 2015, IEEE Symposium on Security and Privacy.
[153] Elisa Costante,et al. Privacy throughout the data cycle , 2015 .
[154] Stefan Dietzel,et al. Resilient in-network aggregation for vehicular networks , 2015 .
[155] A. J. van der Ploeg,et al. Efficient abstractions for visualization and interaction , 2015 .
[156] Roel Verdult,et al. The (in)security of proprietary cryptography , 2015 .
[157] Alfredo Pironti,et al. A Messy State of the Union: Taming the Composite State Machines of TLS , 2015, 2015 IEEE Symposium on Security and Privacy.
[158] A. S. E C U R I T Y P R O B L E M M Ay B E T H E O R E T. Vulnerable Compliance , 2022 .