more
This commit is contained in:
109
main.bbl
109
main.bbl
@@ -41,11 +41,6 @@ D.~Basin, C.~Cremers, J.~Dreier, and R.~Sasse,
|
||||
cryptographic protocols},'' \emph{\BIBforeignlanguage{en}{IEEE Security \&
|
||||
Privacy}}, vol.~20, no.~3, p. 24–32, May 2022.
|
||||
|
||||
\bibitem{Blanchet_Smyth_Cheval_Sylvestre}
|
||||
B.~Blanchet, B.~Smyth, V.~Cheval, and M.~Sylvestre,
|
||||
``\BIBforeignlanguage{en}{Proverif 2.05: Automatic cryptographic protocol
|
||||
verifier, user manual and tutorial}.''
|
||||
|
||||
\bibitem{Kobeissi_Nicolas_Tiwari}
|
||||
N.~Kobeissi, G.~Nicolas, and M.~Tiwari, ``\BIBforeignlanguage{en}{Verifpal:
|
||||
Cryptographic protocol analysis for the real world}.''
|
||||
@@ -139,4 +134,108 @@ D.~Kozen, ``\BIBforeignlanguage{en}{Lower bounds for natural proof systems},''
|
||||
\url{http://ieeexplore.ieee.org/document/4567949/}
|
||||
\BIBentrySTDinterwordspacing
|
||||
|
||||
\bibitem{Proverif}
|
||||
B.~Blanchet, B.~Smyth, V.~Cheval, and M.~Sylvestre,
|
||||
``\BIBforeignlanguage{en}{Proverif 2.05: Automatic cryptographic protocol
|
||||
verifier, user manual and tutorial}.''
|
||||
|
||||
\bibitem{Tamarin}
|
||||
D.~Basin, C.~Cremers, J.~Dreier, and R.~Sasse,
|
||||
``\BIBforeignlanguage{en}{Tamarin: Verification of large-scale, real-world,
|
||||
cryptographic protocols},'' \emph{\BIBforeignlanguage{en}{IEEE Security \&
|
||||
Privacy}}, vol.~20, no.~3, p. 24–32, May 2022.
|
||||
|
||||
\bibitem{Cremers}
|
||||
\BIBentryALTinterwordspacing
|
||||
C.~J.~F. Cremers, \emph{\BIBforeignlanguage{en}{The Scyther Tool: Verification,
|
||||
Falsification, and Analysis of Security Protocols}}, ser. Lecture Notes in
|
||||
Computer Science.\hskip 1em plus 0.5em minus 0.4em\relax Berlin, Heidelberg:
|
||||
Springer Berlin Heidelberg, 2008, vol. 5123, p. 414–418. [Online].
|
||||
Available: \url{http://link.springer.com/10.1007/978-3-540-70545-1_38}
|
||||
\BIBentrySTDinterwordspacing
|
||||
|
||||
\bibitem{Pereira}
|
||||
V.~Pereira, ``\BIBforeignlanguage{en}{Easycrypt - a (brief) tutorial}.''
|
||||
|
||||
\bibitem{ParnoSOK}
|
||||
\BIBentryALTinterwordspacing
|
||||
M.~Barbosa, G.~Barthe, K.~Bhargavan, B.~Blanchet, C.~Cremers, K.~Liao, and
|
||||
B.~Parno, ``Sok: Computer-aided cryptography,'' in \emph{2021 IEEE Symposium
|
||||
on Security and Privacy (SP)}, May 2021, p. 777–795. [Online]. Available:
|
||||
\url{https://ieeexplore.ieee.org/document/9519449/?arnumber=9519449}
|
||||
\BIBentrySTDinterwordspacing
|
||||
|
||||
\bibitem{Basin_Cremers_Meadows_2018}
|
||||
\BIBentryALTinterwordspacing
|
||||
D.~Basin, C.~Cremers, and C.~Meadows, \emph{\BIBforeignlanguage{en}{Model
|
||||
Checking Security Protocols}}.\hskip 1em plus 0.5em minus 0.4em\relax Cham:
|
||||
Springer International Publishing, 2018, p. 727–762. [Online]. Available:
|
||||
\url{http://link.springer.com/10.1007/978-3-319-10575-8_22}
|
||||
\BIBentrySTDinterwordspacing
|
||||
|
||||
\bibitem{Khan_Mukund_Suresh_2005}
|
||||
\BIBentryALTinterwordspacing
|
||||
A.~S. Khan, M.~Mukund, and S.~P. Suresh, \emph{\BIBforeignlanguage{en}{Generic
|
||||
Verification of Security Protocols}}, ser. Lecture Notes in Computer
|
||||
Science.\hskip 1em plus 0.5em minus 0.4em\relax Berlin, Heidelberg: Springer
|
||||
Berlin Heidelberg, 2005, vol. 3639, p. 221–235. [Online]. Available:
|
||||
\url{http://link.springer.com/10.1007/11537328_18}
|
||||
\BIBentrySTDinterwordspacing
|
||||
|
||||
\bibitem{wayne_adversaries}
|
||||
\BIBentryALTinterwordspacing
|
||||
H.~Wayne, ``Modeling adversaries with tla+,''
|
||||
\url{https://www.hillelwayne.com/post/adversaries/}, 2019, accessed:
|
||||
2024-12-03. [Online]. Available:
|
||||
\url{https://www.hillelwayne.com/post/adversaries/}
|
||||
\BIBentrySTDinterwordspacing
|
||||
|
||||
\bibitem{Narayana_Chen_Zhao_Chen_Fu_Zhou_2006}
|
||||
\BIBentryALTinterwordspacing
|
||||
P.~Narayana, R.~Chen, Y.~Zhao, Y.~Chen, Z.~Fu, and H.~Zhou, ``Automatic
|
||||
vulnerability checking of ieee 802.16 wimax protocols through tla+,'' in
|
||||
\emph{2006 2nd IEEE Workshop on Secure Network Protocols}, Nov. 2006, p.
|
||||
44–49. [Online]. Available:
|
||||
\url{https://ieeexplore.ieee.org/document/4110436/?arnumber=4110436}
|
||||
\BIBentrySTDinterwordspacing
|
||||
|
||||
\bibitem{Delzanno_Tatarek_Traverso_2014}
|
||||
G.~Delzanno, M.~Tatarek, and R.~Traverso, ``\BIBforeignlanguage{en}{Model
|
||||
checking paxos in spin},'' \emph{\BIBforeignlanguage{en}{Electronic
|
||||
Proceedings in Theoretical Computer Science}}, vol. 161, p. 131–146, Aug.
|
||||
2014.
|
||||
|
||||
\bibitem{Castro_Liskov_2002}
|
||||
M.~Castro and B.~Liskov, ``\BIBforeignlanguage{en}{Practical byzantine fault
|
||||
tolerance and proactive recovery},'' \emph{\BIBforeignlanguage{en}{ACM
|
||||
Transactions on Computer Systems}}, vol.~20, no.~4, p. 398–461, Nov. 2002.
|
||||
|
||||
\bibitem{Henda}
|
||||
\BIBentryALTinterwordspacing
|
||||
N.~Ben~Henda, ``\BIBforeignlanguage{en}{Generic and efficient attacker models
|
||||
in spin},'' in \emph{\BIBforeignlanguage{en}{Proceedings of the 2014
|
||||
International SPIN Symposium on Model Checking of Software}}.\hskip 1em plus
|
||||
0.5em minus 0.4em\relax San Jose CA USA: ACM, Jul. 2014, p. 77–86.
|
||||
[Online]. Available: \url{https://dl.acm.org/doi/10.1145/2632362.2632378}
|
||||
\BIBentrySTDinterwordspacing
|
||||
|
||||
\bibitem{Ginesin}
|
||||
\BIBentryALTinterwordspacing
|
||||
J.~Ginesin, M.~von Hippel, E.~Defloor, C.~Nita-Rotaru, and M.~Tüxen, ``A
|
||||
formal analysis of sctp: Attack synthesis and patch verification,'' no.
|
||||
arXiv:2403.05663, Mar. 2024, arXiv:2403.05663 [cs]. [Online]. Available:
|
||||
\url{http://arxiv.org/abs/2403.05663}
|
||||
\BIBentrySTDinterwordspacing
|
||||
|
||||
\bibitem{TCPwn}
|
||||
\BIBentryALTinterwordspacing
|
||||
S.~Jero, E.~Hoque, D.~Choffnes, A.~Mislove, and C.~Nita-Rotaru,
|
||||
``\BIBforeignlanguage{en}{Automated attack discovery in tcp congestion
|
||||
control using a model-guided approach},'' in
|
||||
\emph{\BIBforeignlanguage{en}{Proceedings 2018 Network and Distributed System
|
||||
Security Symposium}}.\hskip 1em plus 0.5em minus 0.4em\relax San Diego, CA:
|
||||
Internet Society, 2018. [Online]. Available:
|
||||
\url{https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018_02A-1_Jero_paper.pdf}
|
||||
\BIBentrySTDinterwordspacing
|
||||
|
||||
\end{thebibliography}
|
||||
|
||||
Reference in New Issue
Block a user