This commit is contained in:
Cristina Nita-Rotaru
2024-12-04 17:53:40 -05:00
parent f2270fd35b
commit 07dfd06cb4
2 changed files with 3 additions and 2 deletions

View File

@@ -64,7 +64,8 @@ comment,adjustbox,mdframed,changepage,algorithm,algorithmic}
T\kern-.1667em\lower.7ex\hbox{E}\kern-.125emX}} T\kern-.1667em\lower.7ex\hbox{E}\kern-.125emX}}
\begin{document} \begin{document}
\title{\korg: An Attack Synthesis Tool\\ for Distributed Protocols\\ \title{\korg: An Attack Synthesis Tool\\ for Distributed Protocols\\\\
\LARGE Tool Paper
} }

View File

@@ -357,7 +357,7 @@ Next, the user selects a \textit{channel} to generate an attacker on, and an att
$ ./panda --model=abp.pml --attacker=replay --channel=StoR,RtoS --eval $ ./panda --model=abp.pml --attacker=replay --channel=StoR,RtoS --eval
\end{lstlisting} \end{lstlisting}
\korg will then modify the \texttt{abp.pml} file to include the \texttt{replay} attacker gadgets attacking channels \texttt{StoR} and \texttt{RtoS}, and model-check it with \spin. \korg outputs the following text, cut down for readability, indicating an exhaustive search for attacks:\\\\ \korg will then modify the \texttt{abp.pml} file to include the \texttt{replay} attacker gadgets attacking channels \texttt{StoR} and \texttt{RtoS}, and model-check it with \spin. \korg outputs the following text, cut down for readability, indicating an exhaustive search for attacks:
\begin{lstlisting} \begin{lstlisting}
Full statespace search for: Full statespace search for:
never claim + (eventually_agrees) never claim + (eventually_agrees)