A Security Analysis Method for Security Protocol Implementations Based on Message Construction
暂无分享,去创建一个
Chin-Tser Huang | Xudong He | Dejun Wang | Bo Meng | Lili Yao | Jintian Lu | Chin-Tser Huang | Xudong He | Bo Meng | Dejun Wang | Jintian Lu | Lili Yao
[1] Andrew D. Gordon,et al. Verified interoperable implementations of security protocols , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[2] Dongdai Lin,et al. Survey on cyberspace security , 2015, Science China Information Sciences.
[3] Siyu Tao,et al. Bit-oriented format extraction approach for automatic binary protocol reverse engineering , 2016, IET Commun..
[4] Wei Chen,et al. Mechanized Verification of Cryptographic Security of Cryptographic Security Protocol Implementation in JAVA through Model Extraction in the Computational Model , 2015 .
[5] Sandeep K. Shukla,et al. A Survey of Automatic Protocol Reverse Engineering Tools , 2015, ACM Comput. Surv..
[6] S. B. Needleman,et al. A general method applicable to the search for similarities in the amino acid sequence of two proteins. , 1970, Journal of molecular biology.
[7] Yu Zhou,et al. A Semantics-Aware Approach to the Automated Network Protocol Identification , 2016, IEEE/ACM Transactions on Networking.
[8] Shunzheng Yu,et al. Position-based automatic reverse engineering of network protocols , 2013, J. Netw. Comput. Appl..
[9] Jan Jürjens. Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project , 2009, Electron. Notes Theor. Comput. Sci..
[10] Marco Mellia,et al. Towards automatic protocol field inference , 2016, Comput. Commun..