miTLS: Verifying Protocol Implementations against Real-World Attacks
暂无分享,去创建一个
[1] Alfredo Pironti,et al. Implementing TLS with Verified Cryptographic Security , 2013, 2013 IEEE Symposium on Security and Privacy.
[2] Matthew Green,et al. Downgrade Resilience in Key-Exchange Protocols , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[3] Hugo Krawczyk,et al. The OPTLS Protocol and TLS 1.3 , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[4] Andrew D. Gordon,et al. Modular verification of security protocol code by typing , 2010, POPL '10.
[5] Cédric Fournet,et al. Cryptographically verified implementations for TLS , 2008, CCS.
[6] Matthew Green,et al. Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice , 2015, CCS.
[7] Serge Vaudenay,et al. Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS , 2002, EUROCRYPT.
[8] Alfredo Pironti,et al. A Messy State of the Union: Taming the Composite State Machines of TLS , 2015, 2015 IEEE Symposium on Security and Privacy.
[9] Kenneth G. Paterson,et al. Provable Security in the Real World , 2011, IEEE Security & Privacy.
[10] Alfredo Pironti,et al. Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS , 2014, 2014 IEEE Symposium on Security and Privacy.
[11] Martín Abadi,et al. Prudent engineering practice for cryptographic protocols , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[12] Bruce Schneier,et al. Analysis of the SSL 3.0 protocol , 1996 .
[13] Pierre-Yves Strub,et al. Modular code-based cryptographic verification , 2011, CCS '11.