SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations
暂无分享,去创建一个
Ninghui Li | Aniket Kate | Cristina Nita-Rotaru | Md. Endadul Hoque | Omar Chowdhury | Sze Yiu Chau | Huangyi Ge | Ninghui Li | C. Nita-Rotaru | Omar Chowdhury | Huangyi Ge | Aniket Kate
[1] A. Turing. On Computable Numbers, with an Application to the Entscheidungsproblem. , 1937 .
[2] James C. King,et al. Symbolic execution and program testing , 1976, CACM.
[3] Greg Nelson,et al. Fast Decision Procedures Based on Congruence Closure , 1980, JACM.
[4] M. Gordon,et al. Introduction to HOL: a theorem proving environment for higher order logic , 1993 .
[5] Patrice Godefroid,et al. Model checking for programming languages using VeriSoft , 1997, POPL '97.
[6] W. M. McKeeman,et al. Differential Testing for Software , 1998, Digit. Tech. J..
[7] Gerard J. Holzmann,et al. A practical method for verifying event-driven software , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).
[8] Carlisle Adams,et al. Understanding PKI: Concepts, Standards, and Deployment Considerations , 1999 .
[9] Somesh Jha,et al. Verifying security protocols with Brutus , 2000, TSEM.
[10] X Itu,et al. Information technology-open systems interconnection-the directory: Public-key and attribute certific , 2000 .
[11] Klaus Havelund,et al. Model checking programs , 2000, Proceedings ASE 2000. Fifteenth IEEE International Conference on Automated Software Engineering.
[12] Sriram K. Rajamani,et al. The SLAM project: debugging system software via static analysis , 2002, POPL '02.
[13] Thomas A. Henzinger,et al. Lazy abstraction , 2002, POPL '02.
[14] Sorin Lerner,et al. ESP: path-sensitive program verification in polynomial time , 2002, PLDI '02.
[15] Edmund M. Clarke,et al. Counterexample-Guided Abstraction Refinement , 2000, CAV.
[16] Alex Groce,et al. Modular verification of software components in C , 2003, 25th International Conference on Software Engineering, 2003. Proceedings..
[17] Steven Legg,et al. ASN.1 Module Definition for the LDAP and X.500 Component Matching Rules , 2004, RFC.
[18] Jakob Rehof,et al. Zing: A Model Checker for Concurrent Software , 2004, CAV.
[19] Daniel Kroening,et al. SATABS: SAT-Based Predicate Abstraction for ANSI-C , 2005, TACAS.
[20] Koushik Sen,et al. CUTE: a concolic unit testing engine for C , 2005, ESEC/FSE-13.
[21] Thomas A. Henzinger,et al. SYNERGY: a new algorithm for property checking , 2006, SIGSOFT '06/FSE-14.
[22] Javier Esparza,et al. Abstraction Refinement with Craig Interpolation and Symbolic Pushdown Systems , 2006, J. Satisf. Boolean Model. Comput..
[23] David L. Dill,et al. A Decision Procedure for Bit-Vectors and Arrays , 2007, CAV.
[24] Alberto Savoia,et al. Differential testing: a new approach to change detection , 2007, ESEC-FSE '07.
[25] Thomas A. Henzinger,et al. The software model checker B last : Applications to software engineering , 2007 .
[26] Dawson R. Engler,et al. EXE: automatically generating inputs of death , 2006, CCS '06.
[27] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[28] Nikolai Tillmann,et al. Automating Software Testing Using Program Analysis , 2008, IEEE Software.
[29] David Cooper,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.
[30] Cesare Tinelli,et al. Satisfiability Modulo Theories , 2021, Handbook of Satisfiability.
[31] Koushik Sen. DART: Directed Automated Random Testing , 2009, Haifa Verification Conference.
[32] Charles Gardiner,et al. ASN.1 Translation , 2010, RFC.
[33] Dawson R. Engler,et al. Practical, Low-Effort Equivalence Verification of Real Code , 2011, CAV.
[34] George Candea,et al. S2E: a platform for in-vivo multi-path analysis of software systems , 2011, ASPLOS XVI.
[35] Sarfraz Khurshid,et al. Symbolic execution for software testing in practice: preliminary assessment , 2011, 2011 33rd International Conference on Software Engineering (ICSE).
[36] Marco Canini,et al. A NICE Way to Test OpenFlow Applications , 2012, NSDI.
[37] Todd Millstein,et al. Automatic predicate abstraction of C programs , 2001, PLDI '01.
[38] Marco Canini,et al. A SOFT way for openflow switch interoperability testing , 2012, CoNEXT '12.
[39] Jorge A. Navas,et al. TRACER: A Symbolic Execution Tool for Verification , 2012, CAV.
[40] SAGE: whitebox fuzzing for security testing , 2012, Commun. ACM.
[41] Vitaly Shmatikov,et al. The most dangerous code in the world: validating SSL certificates in non-browser software , 2012, CCS.
[42] Stefan Löwe. CPAchecker with Explicit-Value Analysis Based on CEGAR and Interpolation - (Competition Contribution) , 2013, TACAS.
[43] Alfredo Pironti,et al. Implementing TLS with Verified Cryptographic Security , 2013, 2013 IEEE Symposium on Security and Privacy.
[44] Koushik Sen,et al. Symbolic execution for software testing: three decades later , 2013, CACM.
[45] Kevin R. B. Butler,et al. Securing SSL Certificate Verification through Dynamic Linking , 2014, CCS.
[46] Poul-Henning Kamp. Please Put OpenSSL Out of Its Misery , 2014, ACM Queue.
[47] Vitaly Shmatikov,et al. Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations , 2014, 2014 IEEE Symposium on Security and Privacy.
[48] Alfredo Pironti,et al. Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS , 2014, 2014 IEEE Symposium on Security and Privacy.
[49] Alastair F. Donaldson,et al. Software Model Checking , 2014, Computing Handbook, 3rd ed..
[50] George Candea,et al. Efficient state merging in symbolic execution , 2012, Software Engineering.
[51] Loris D'Antoni,et al. Minimization of symbolic automata , 2014, POPL.
[52] Collin Jackson,et al. Analyzing Forged SSL Certificates in the Wild , 2014, 2014 IEEE Symposium on Security and Privacy.
[53] Cesare Tinelli,et al. A DPLL(T) Theory Solver for a Theory of Strings and Regular Expressions , 2014, CAV.
[54] Ramesh Govindan,et al. Analyzing Protocol Implementations for Interoperability , 2015, NSDI.
[55] Srinath T. V. Setty,et al. IronFleet: proving practical distributed systems correct , 2015, SOSP.
[56] Peter Sewell,et al. Not-Quite-So-Broken TLS: Lessons in Re-Engineering a Security Protocol Specification and Implementation , 2015, USENIX Security Symposium.
[57] V. N. Venkatakrishnan,et al. Vetting SSL Usage in Applications with SSLINT , 2015, 2015 IEEE Symposium on Security and Privacy.
[58] Markus Gruber,et al. Prying Open Pandora's Box: KCI Attacks against TLS , 2015, WOOT.
[59] Joeri de Ruiter,et al. Protocol State Fuzzing of TLS Implementations , 2015, USENIX Security Symposium.
[60] Dawson R. Engler,et al. Under-Constrained Symbolic Execution: Correctness Checking for Real Code , 2015, USENIX Annual Technical Conference.
[61] Changwoo Min,et al. Cross-checking semantic correctness: the case of finding file system bugs , 2015, SOSP.
[62] Alfredo Pironti,et al. FLEXTLS: A Tool for Testing TLS Implementations , 2015, WOOT.
[63] Alfredo Pironti,et al. A Messy State of the Union: Taming the Composite State Machines of TLS , 2015, 2015 IEEE Symposium on Security and Privacy.
[64] Juraj Somorovsky,et al. Systematic Fuzzing and Testing of TLS Libraries , 2016, CCS.
[65] Stefan Katzenbeisser,et al. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security , 2016, CCS.
[66] Patrick Schaumont,et al. Report on the NSF Workshop on Formal Methods for Security , 2016, ArXiv.
[67] Angelos D. Keromytis,et al. SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning , 2016, CCS.
[68] Angelos D. Keromytis,et al. Back in Black: Towards Formal, Black Box Analysis of Sanitizers and Filters , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[69] Mayur Naik,et al. APISan: Sanitizing API Usages through Semantic Cross-Checking , 2016, USENIX Security Symposium.