Lessons learned in the analysis of the EMV and TLS security protocols

[1]  Tsun S. Chow,et al.  Testing Software Design Modeled by Finite-State Machines , 1978, IEEE Transactions on Software Engineering.

[2]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[3]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[4]  Dana Angluin,et al.  Learning Regular Sets from Queries and Counterexamples , 1987, Inf. Comput..

[5]  Gavin Lowe,et al.  An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..

[6]  Gavin Lowe,et al.  Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.

[7]  Daniel Bleichenbacher,et al.  Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1 , 1998, CRYPTO.

[8]  Christopher Allen,et al.  The TLS Protocol Version 1.0 , 1999, RFC.

[9]  Lawrence C. Paulson,et al.  Inductive analysis of the Internet protocol TLS , 1999, TSEC.

[10]  Bruno Blanchet,et al.  An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[11]  Martín Abadi,et al.  Analyzing security protocols with secrecy types and logic programs , 2002, POPL '02.

[12]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[13]  Oliver Niese,et al.  An integrated approach to testing complex systems , 2003 .

[14]  Lionel Mamane,et al.  Interactive mathematical documents: creation and presentation , 2004 .

[15]  Gregorio Díaz,et al.  Automatic verification of the TLS handshake protocol , 2004, SAC '04.

[16]  Thomas Bäck,et al.  Mixed-integer evolution strategies for parameter optimization and their applications to medical image analysis , 2005 .

[17]  John C. Mitchell,et al.  A modular correctness proof of IEEE 802.11i and TLS , 2005, CCS '05.

[18]  B. Lijnse,et al.  TOP to the rescue. Task-oriented programming for incident response applications , 2005 .

[19]  Bruno Blanchet,et al.  Reconstruction of attacks against cryptographic protocols , 2005, 18th IEEE Computer Security Foundations Workshop (CSFW'05).

[20]  Kazuhiro Ogata,et al.  Equational Approach to Formal Analysis of TLS , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[21]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.

[22]  Andrew D. Gordon,et al.  Verified Interoperable Implementations of Security Protocols , 2006, CSFW.

[23]  David Naccache,et al.  The Sorcerer's Apprentice Guide to Fault Attacks , 2006, Proceedings of the IEEE.

[24]  Steven J. Murdoch,et al.  Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks , 2007, USENIX Security Symposium.

[25]  M. D. Berg,et al.  Optimal Geometric Data Structures , 2007 .

[26]  Farhad Arbab,et al.  Model Checking of Component Connectors , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[27]  Michael Baentsch,et al.  The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks , 2008, TRUST.

[28]  Steven J. Murdoch,et al.  Thinking Inside the Box: System-Level Failures of Tamper Proofing , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[29]  Fingerprinting Passports , 2008 .

[30]  Ahmad-Reza Sadeghi,et al.  Universally Composable Security Analysis of TLS , 2008, ProvSec.

[31]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.

[32]  Cédric Fournet,et al.  Cryptographically verified implementations for TLS , 2008, CCS.

[33]  Seyyed Hamed Hashemi,et al.  Studies on verification of wireless sensor networks and abstraction learning for system inference , 2008 .

[34]  Hugo Jonker,et al.  Security matters : privacy in voting and fairness in digital exchange , 2009 .

[35]  M. J. de Mol,et al.  Reasoning about functional programs : Sparkle, a proof assistant for Clean , 2009 .

[36]  Oscar H. Ibarra,et al.  On spiking neural P systems , 2006, Natural Computing.

[37]  Steven J. Murdoch,et al.  Optimised to Fail: Card Readers for Online Banking , 2009, Financial Cryptography.

[38]  van Mpwj Michiel Osch Automated model-based testing of hybrid systems , 2009 .

[39]  A. Rodriguez Yakushev,et al.  Towards Getting Generic Programming Ready for Prime Time , 2009 .

[40]  Bogdan Warinschi,et al.  The TLS Handshake Protocol: A Modular Analysis , 2010, Journal of Cryptology.

[41]  Mohammed G. Khatib MEMS-Based Storage Devices : Integration in Energy-Constrained Mobile Systems , 2009 .

[42]  J. Kwisthout,et al.  The Computational Complexity of Probabilistic Networks , 2009 .

[43]  Sebastiaan Gijsbert Marinus Cornelissen,et al.  Evaluating Dynamic Analysis Techniques for Program Comprehension , 2009 .

[44]  H. Hansen Coalgebraic Modelling : Applications in Automata theory and Modal logic , 2009 .

[45]  Marcel Verhoef,et al.  Modeling and validating distributed embedded real-time control systems , 2009 .

[46]  Tiziana Margaria,et al.  LearnLib: a framework for extrapolating behavioral models , 2009, International Journal on Software Tools for Technology Transfer.

[47]  Marcin Czenko,et al.  TuLiP : reshaping trust management , 2009 .

[48]  D. Costa Formal models for component connectors , 2010 .

[49]  Frits W. Vaandrager,et al.  Inference and Abstraction of the Biometric Passport , 2010, ISoLA.

[50]  Mike Bond,et al.  2010 IEEE Symposium on Security and Privacy Chip and PIN is Broken , 2022 .

[51]  Mark de Berg,et al.  Computing push plans for disk-shaped robots , 2010, 2010 IEEE International Conference on Robotics and Automation.

[52]  Tom Staijen,et al.  Graph-based Specification and Verification for Aspect-Oriented Languages , 2010 .

[53]  J. Endrullis Termination and Productivity , 2010 .

[54]  C. J. Boogerd,et al.  Focusing Automatic Code Inspections , 2010 .

[55]  Ruth Breu,et al.  A Classification for Model-Based Security Testing , 2011 .

[56]  B. J. Arnoldus,et al.  An illumination of the template enigma : software code generation with templates , 2011 .

[57]  A. Morali,et al.  IT architecture-based confidentiality risk assessment in networks of organizations , 2011 .

[58]  Z Zvezdan Protic,et al.  Configuration management for models : generic methods for model comparison and model co-evolution , 2011 .

[59]  Hendrik Michaël van der Bijl,et al.  On changing models in model-based testing , 2011 .

[60]  Miguel E. Andrés,et al.  Quantitative Analysis of Information Leakage in Probabilistic and Nondeterministic Systems , 2011, ArXiv.

[61]  Sean Turner,et al.  Prohibiting Secure Sockets Layer (SSL) Version 2.0 , 2011, RFC.

[62]  Somayeh Malakuti Khah Olun Abadi Event composition model: achieving naturalness in runtime enforcement , 2011 .

[63]  van Pja Paul Tilburg From computability to executability : a process-theoretic view on automata theory , 2011 .

[64]  Jean-Pierre Szikora Banques en ligne : à la découverte d'EMV-CAP , 2011 .

[65]  Christian Krause,et al.  Reconfigurable Component Connectors , 2011 .

[66]  Lacramioara Astefanoaei,et al.  An executable theory of multi-agent systems refinement , 2011 .

[67]  Stephanie Kemper,et al.  Modelling and analysis of real-time coordination patterns , 2011 .

[68]  Gavin Lowe,et al.  Analysing TLS in the strand spaces model , 2011, J. Comput. Secur..

[69]  V. Laz Faculty of Mathematics and Computer Science , 2011 .

[70]  M Muhammad Atif,et al.  Formal modeling and verification of distributed failure detectors , 2011 .

[71]  Ronald Middelkoop,et al.  Capturing and exploiting abstract views of states in OO verification , 2011 .

[72]  Joeri de Ruiter,et al.  Formal Analysis of the EMV Protocol Suite , 2011, TOSCA.

[73]  Lennart C. L. Kats,et al.  Building Blocks for Language Workbenches , 2011 .

[74]  Young-Joo Moon,et al.  Stochastic models for quality of service of component connectors , 2011 .

[75]  Emmanuele Zambon,et al.  Towards optimal IT availability planning: methods and tools , 2011 .

[76]  Bas Basten,et al.  Ambiguity Detection for Programming Language Grammars , 2011 .

[77]  Erik Poll,et al.  Rigorous specifications of the SSH Transport Layer , 2011 .

[78]  W. Kuijper Compositional Synthesis of Safety Controllers , 2012 .

[79]  Zef Hemel Methods and Techniques for the Design and Implementation of Domain-Specific Languages , 2012 .

[80]  Joeri de Ruiter,et al.  The SmartLogic Tool: Analysing and Testing Smart Card Protocols , 2012, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation.

[81]  Tibor Jager,et al.  On the Security of TLS-DHE in the Standard Model , 2012, CRYPTO.

[82]  Joeri de Ruiter,et al.  Designed to Fail: A USB-Connected Reader for Online Banking , 2012, NordSec.

[83]  Adriaan Middelkoop,et al.  Inference of Program Properties with Attribute Grammars, Revisited , 2012 .

[84]  D. E. Nadales Agut,et al.  A Compositional Interchange Format for Hybrid Systems: Design and Implementation , 2012 .

[85]  Ljp Luc Engelen From napkin sketches to reliable software , 2012 .

[86]  Saeed Sedghi,et al.  Towards Provably Secure Efficiently Searchable Encryption , 2012 .

[87]  Fpm Frank Stappers Bridging formal models : an engineering perspective , 2012 .

[88]  Mark Ryan,et al.  New privacy issues in mobile telephony: fix and verification , 2012, CCS.

[89]  Sergey Bratus,et al.  A Patch for Postel's Robustness Principle , 2012, IEEE Security & Privacy.

[90]  Michael Tüxen,et al.  Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) Heartbeat Extension , 2012, RFC.

[91]  Kab Kevin Verbeek Algorithms for cartographic visualization , 2012 .

[92]  van Mf Marcel Amstel,et al.  Assessing and improving the quality of model transformations , 2012 .

[93]  Hossein Rahmani,et al.  Analysis of protein-protein interaction networks by means of annotated graph mining algorithms , 2012 .

[94]  Aah Ammar Osaiweran Formal development of control software in the medical systems domain , 2012 .

[95]  Joeri de Ruiter,et al.  Model Checking under Fairness in ProB and Its Application to Fair Exchange Protocols , 2012, ICTAC.

[96]  Trajce Dimkov,et al.  Alignment of organizational security policies: Theory and Practice , 2012 .

[97]  John Businge,et al.  Co-evolution of the Eclipse SDK Framework and Its Third-Party Plug-Ins , 2013, 2013 17th European Conference on Software Maintenance and Reengineering.

[98]  Joeri de Ruiter,et al.  Formal Models of Bank Cards for Free , 2013, 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops.

[99]  Joeri de Ruiter,et al.  The Radboud Reader: A Minimal Trusted Smartcard Reader for Securing Online Transactions , 2013, IDMAN.

[100]  Kenneth G. Paterson,et al.  On the Security of the TLS Protocol: A Systematic Analysis , 2013, IACR Cryptol. ePrint Arch..

[101]  Jja Jeroen Keiren,et al.  Advanced reduction techniques for model checking , 2013 .

[102]  M. S. Greiler,et al.  Test Suite Comprehension for Modular and Dynamic Systems , 2013 .

[103]  Mark Timmer,et al.  Efficient modelling, generation and analysis of Markov automata , 2013 .

[104]  L. Lensink,et al.  Applying formal methods in software development , 2013 .

[105]  Kenneth G. Paterson,et al.  Lucky Thirteen: Breaking the TLS and DTLS Record Protocols , 2013, 2013 IEEE Symposium on Security and Privacy.

[106]  Dhp Dirk Gerrits Pushing and pulling : computing push plans for disk-shaped robots, and dynamic labelings for moving points , 2013 .

[107]  Kenneth G. Paterson,et al.  On the Security of RC4 in TLS , 2013, USENIX Security Symposium.

[108]  Eduardo Zambon,et al.  Abstract Graph Transformation - Theory and Practice , 2013 .

[109]  Mjm Marcel Roeloffzen Kinetic data structures in the black-box model , 2013 .

[110]  Carst Tankink Documentation and formal mathematics : web technology meets theorem proving , 2013 .

[111]  van den,et al.  Composition and synchronization of real-time components upon one processor , 2013 .

[112]  Alfredo Pironti,et al.  Implementing TLS with Verified Cryptographic Security , 2013, 2013 IEEE Symposium on Security and Privacy.

[113]  Georgeta Igna,et al.  Performance analysis of real-time task systems using timed automata , 2013 .

[114]  Jörg Schwenk,et al.  SoK: Lessons Learned from SSL/TLS Attacks , 2013, WISA.

[115]  Gerhard de Koning Gans,et al.  Outsmarting smart cards , 2013 .

[116]  Sander van der Burg,et al.  A Reference Architecture for Distributed Software Deployment , 2013 .

[117]  Joeri de Ruiter Automated algebraic analysis of structure-preserving signature schemes , 2014, IACR Cryptol. ePrint Arch..

[118]  Michiel Helvensteijn,et al.  Abstract delta modeling : software product lines and beyond , 2014 .

[119]  Axel Belinfante,et al.  JTorX: exploring model-based testing , 2014 .

[120]  Bn Bogdan Vasilescu Social aspects of collaboration in online software communities , 2014 .

[121]  Vitaly Shmatikov,et al.  Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations , 2014, 2014 IEEE Symposium on Security and Privacy.

[122]  Joost Winter,et al.  Coalgebraic Characterizations of Automata-Theoretic Classes , 2014 .

[123]  Joeri de Ruiter,et al.  Analysis of Secure Key Storage Solutions on Android , 2014, SPSM@CCS.

[124]  Adrianus Johannus Paulus Jeckmans Cryptographically-Enhanced Privacy for Recommender Systems , 2014 .

[125]  Jm Jordi Breekel,et al.  A security evaluation and proof-of-concept relay attack on Dutch EMV contactless transactions , 2014 .

[126]  Marijn Paul Schraagen,et al.  Aspects of record linkage , 2014 .

[127]  Alfons Laarman,et al.  Scalable multi-core model checking , 2014 .

[128]  J. van den Bos,et al.  Gathering evidence: Model-driven software engineering in automated digital forensics , 2014 .

[129]  Frank W. Takes Algorithms for analyzing and mining real-world graphs , 2014 .

[130]  Joeri de Ruiter,et al.  Automated Reverse Engineering using Lego® , 2014, WOOT.

[131]  N Neda Noroozi,et al.  Improving input-output conformance testing theories , 2014 .

[132]  Pim Vullers,et al.  Efficient implementations of attribute-based credentials on smart cards , 2014 .

[133]  Cor-Paul Bezemer,et al.  Performance Optimization of Multi-Tenant Software Systems , 2014 .

[134]  Frank S. de Boer,et al.  Combining Monitoring with Run-Time Assertion Checking , 2014, SFM.

[135]  David A. Wheeler Preventing Heartbleed , 2014, Computer.

[136]  Mike Bond,et al.  Chip and Skim: Cloning EMV Cards with the Pre-play Attack , 2012, 2014 IEEE Symposium on Security and Privacy.

[137]  Fides Aarts,et al.  Tomte : bridging the gap between active learning and real-world systems , 2014 .

[138]  van der,et al.  Domain specific languages and their type systems , 2014 .

[139]  Wouter Meulemans,et al.  Similarity measures and algorithms for cartographic schematization , 2014 .

[140]  Erik Tews,et al.  Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks , 2014, USENIX Security Symposium.

[141]  Minh Tri Ngo,et al.  Qualitative and Quantitative Information Flow Analysis for Multi-threaded Programs , 2014 .

[142]  A. Narwade,et al.  Faculty of Electrical Engineering, Mathematics and Computer Science , 2015 .

[143]  Bengt Jonsson,et al.  Generating models of infinite-state communication protocols using regular inference with abstraction , 2015, Formal Methods Syst. Des..

[144]  Peter Sewell,et al.  Not-quite-so-broken TLS: lessons in re-engineering a security protocol specification and implementation , 2015 .

[145]  Peter Sewell,et al.  Not-Quite-So-Broken TLS: Lessons in Re-Engineering a Security Protocol Specification and Implementation , 2015, USENIX Security Symposium.

[146]  Anja Guzzi,et al.  Supporting Developers' Teamwork from within the IDE , 2015 .

[147]  Gergely Alpár,et al.  Attribute-based identity management : [bridging the cryptographic design of ABCs with the real world] , 2015 .

[148]  S Sjoerd Cranen,et al.  Getting the point : obtaining and understanding fixpoints in model checking , 2015 .

[149]  Rjm Rolf Theunissen Supervisory control in health care systems , 2015 .

[150]  T. V. Bui,et al.  A software architecture for body area sensor networks : flexibility and trustworthiness , 2015 .

[151]  Joeri de Ruiter,et al.  Protocol State Fuzzing of TLS Implementations , 2015, USENIX Security Symposium.

[152]  Alfredo Pironti,et al.  A Messy State of the Union: Taming the Composite State Machines of TLS , 2015, IEEE Symposium on Security and Privacy.

[153]  Elisa Costante,et al.  Privacy throughout the data cycle , 2015 .

[154]  Stefan Dietzel,et al.  Resilient in-network aggregation for vehicular networks , 2015 .

[155]  A. J. van der Ploeg,et al.  Efficient abstractions for visualization and interaction , 2015 .

[156]  Roel Verdult,et al.  The (in)security of proprietary cryptography , 2015 .

[157]  Alfredo Pironti,et al.  A Messy State of the Union: Taming the Composite State Machines of TLS , 2015, 2015 IEEE Symposium on Security and Privacy.

[158]  A. S. E C U R I T Y P R O B L E M M Ay B E T H E O R E T Vulnerable Compliance , 2022 .