This commit is contained in:
JakeGinesin
2024-12-03 17:35:01 -05:00
parent b636781367
commit 673782c888
17 changed files with 2417 additions and 2175 deletions

109
main.bbl
View File

@@ -41,11 +41,6 @@ D.~Basin, C.~Cremers, J.~Dreier, and R.~Sasse,
cryptographic protocols},'' \emph{\BIBforeignlanguage{en}{IEEE Security \&
Privacy}}, vol.~20, no.~3, p. 2432, May 2022.
\bibitem{Blanchet_Smyth_Cheval_Sylvestre}
B.~Blanchet, B.~Smyth, V.~Cheval, and M.~Sylvestre,
``\BIBforeignlanguage{en}{Proverif 2.05: Automatic cryptographic protocol
verifier, user manual and tutorial}.''
\bibitem{Kobeissi_Nicolas_Tiwari}
N.~Kobeissi, G.~Nicolas, and M.~Tiwari, ``\BIBforeignlanguage{en}{Verifpal:
Cryptographic protocol analysis for the real world}.''
@@ -139,4 +134,108 @@ D.~Kozen, ``\BIBforeignlanguage{en}{Lower bounds for natural proof systems},''
\url{http://ieeexplore.ieee.org/document/4567949/}
\BIBentrySTDinterwordspacing
\bibitem{Proverif}
B.~Blanchet, B.~Smyth, V.~Cheval, and M.~Sylvestre,
``\BIBforeignlanguage{en}{Proverif 2.05: Automatic cryptographic protocol
verifier, user manual and tutorial}.''
\bibitem{Tamarin}
D.~Basin, C.~Cremers, J.~Dreier, and R.~Sasse,
``\BIBforeignlanguage{en}{Tamarin: Verification of large-scale, real-world,
cryptographic protocols},'' \emph{\BIBforeignlanguage{en}{IEEE Security \&
Privacy}}, vol.~20, no.~3, p. 2432, May 2022.
\bibitem{Cremers}
\BIBentryALTinterwordspacing
C.~J.~F. Cremers, \emph{\BIBforeignlanguage{en}{The Scyther Tool: Verification,
Falsification, and Analysis of Security Protocols}}, ser. Lecture Notes in
Computer Science.\hskip 1em plus 0.5em minus 0.4em\relax Berlin, Heidelberg:
Springer Berlin Heidelberg, 2008, vol. 5123, p. 414418. [Online].
Available: \url{http://link.springer.com/10.1007/978-3-540-70545-1_38}
\BIBentrySTDinterwordspacing
\bibitem{Pereira}
V.~Pereira, ``\BIBforeignlanguage{en}{Easycrypt - a (brief) tutorial}.''
\bibitem{ParnoSOK}
\BIBentryALTinterwordspacing
M.~Barbosa, G.~Barthe, K.~Bhargavan, B.~Blanchet, C.~Cremers, K.~Liao, and
B.~Parno, ``Sok: Computer-aided cryptography,'' in \emph{2021 IEEE Symposium
on Security and Privacy (SP)}, May 2021, p. 777795. [Online]. Available:
\url{https://ieeexplore.ieee.org/document/9519449/?arnumber=9519449}
\BIBentrySTDinterwordspacing
\bibitem{Basin_Cremers_Meadows_2018}
\BIBentryALTinterwordspacing
D.~Basin, C.~Cremers, and C.~Meadows, \emph{\BIBforeignlanguage{en}{Model
Checking Security Protocols}}.\hskip 1em plus 0.5em minus 0.4em\relax Cham:
Springer International Publishing, 2018, p. 727762. [Online]. Available:
\url{http://link.springer.com/10.1007/978-3-319-10575-8_22}
\BIBentrySTDinterwordspacing
\bibitem{Khan_Mukund_Suresh_2005}
\BIBentryALTinterwordspacing
A.~S. Khan, M.~Mukund, and S.~P. Suresh, \emph{\BIBforeignlanguage{en}{Generic
Verification of Security Protocols}}, ser. Lecture Notes in Computer
Science.\hskip 1em plus 0.5em minus 0.4em\relax Berlin, Heidelberg: Springer
Berlin Heidelberg, 2005, vol. 3639, p. 221235. [Online]. Available:
\url{http://link.springer.com/10.1007/11537328_18}
\BIBentrySTDinterwordspacing
\bibitem{wayne_adversaries}
\BIBentryALTinterwordspacing
H.~Wayne, ``Modeling adversaries with tla+,''
\url{https://www.hillelwayne.com/post/adversaries/}, 2019, accessed:
2024-12-03. [Online]. Available:
\url{https://www.hillelwayne.com/post/adversaries/}
\BIBentrySTDinterwordspacing
\bibitem{Narayana_Chen_Zhao_Chen_Fu_Zhou_2006}
\BIBentryALTinterwordspacing
P.~Narayana, R.~Chen, Y.~Zhao, Y.~Chen, Z.~Fu, and H.~Zhou, ``Automatic
vulnerability checking of ieee 802.16 wimax protocols through tla+,'' in
\emph{2006 2nd IEEE Workshop on Secure Network Protocols}, Nov. 2006, p.
4449. [Online]. Available:
\url{https://ieeexplore.ieee.org/document/4110436/?arnumber=4110436}
\BIBentrySTDinterwordspacing
\bibitem{Delzanno_Tatarek_Traverso_2014}
G.~Delzanno, M.~Tatarek, and R.~Traverso, ``\BIBforeignlanguage{en}{Model
checking paxos in spin},'' \emph{\BIBforeignlanguage{en}{Electronic
Proceedings in Theoretical Computer Science}}, vol. 161, p. 131146, Aug.
2014.
\bibitem{Castro_Liskov_2002}
M.~Castro and B.~Liskov, ``\BIBforeignlanguage{en}{Practical byzantine fault
tolerance and proactive recovery},'' \emph{\BIBforeignlanguage{en}{ACM
Transactions on Computer Systems}}, vol.~20, no.~4, p. 398461, Nov. 2002.
\bibitem{Henda}
\BIBentryALTinterwordspacing
N.~Ben~Henda, ``\BIBforeignlanguage{en}{Generic and efficient attacker models
in spin},'' in \emph{\BIBforeignlanguage{en}{Proceedings of the 2014
International SPIN Symposium on Model Checking of Software}}.\hskip 1em plus
0.5em minus 0.4em\relax San Jose CA USA: ACM, Jul. 2014, p. 7786.
[Online]. Available: \url{https://dl.acm.org/doi/10.1145/2632362.2632378}
\BIBentrySTDinterwordspacing
\bibitem{Ginesin}
\BIBentryALTinterwordspacing
J.~Ginesin, M.~von Hippel, E.~Defloor, C.~Nita-Rotaru, and M.~Tüxen, ``A
formal analysis of sctp: Attack synthesis and patch verification,'' no.
arXiv:2403.05663, Mar. 2024, arXiv:2403.05663 [cs]. [Online]. Available:
\url{http://arxiv.org/abs/2403.05663}
\BIBentrySTDinterwordspacing
\bibitem{TCPwn}
\BIBentryALTinterwordspacing
S.~Jero, E.~Hoque, D.~Choffnes, A.~Mislove, and C.~Nita-Rotaru,
``\BIBforeignlanguage{en}{Automated attack discovery in tcp congestion
control using a model-guided approach},'' in
\emph{\BIBforeignlanguage{en}{Proceedings 2018 Network and Distributed System
Security Symposium}}.\hskip 1em plus 0.5em minus 0.4em\relax San Diego, CA:
Internet Society, 2018. [Online]. Available:
\url{https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018_02A-1_Jero_paper.pdf}
\BIBentrySTDinterwordspacing
\end{thebibliography}