more x2
This commit is contained in:
52
main.aux
52
main.aux
@@ -24,32 +24,21 @@
|
||||
\newlabel{sec:usage_attacker_models}{{III}{2}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {III-A}}Dropping Attacker Model}{2}{}\protected@file@percent }
|
||||
\newlabel{sub:Dropping Attacker}{{\mbox {III-A}}{2}{}{}{}}
|
||||
\bibstyle{IEEEtran}
|
||||
\bibdata{main}
|
||||
\bibcite{Lamport_1994}{1}
|
||||
\bibcite{Holzmann_1997}{2}
|
||||
\bibcite{Clarke_Wang}{3}
|
||||
\newlabel{lst:korg_drop}{{2}{3}{}{}{}}
|
||||
\@writefile{lol}{\contentsline {lstlisting}{\numberline {2}Example dropping attacker model gadget with drop limit of 3, targetting channel "cn"}{3}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {III-B}}Replaying Attacker Model}{3}{}\protected@file@percent }
|
||||
\newlabel{sub:Replay Attacker}{{\mbox {III-B}}{3}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {III-C}}Rearranging Attacker Model}{3}{}\protected@file@percent }
|
||||
\newlabel{sub:Rearrange Attacker}{{\mbox {III-C}}{3}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {III-D}}Custom Attacker Models}{3}{}\protected@file@percent }
|
||||
\newlabel{sub:Custom Attacker Models}{{\mbox {III-D}}{3}{}{}{}}
|
||||
\newlabel{lst:korg_replay}{{3}{3}{}{}{}}
|
||||
\@writefile{lol}{\contentsline {lstlisting}{\numberline {3}Example replay attacker model gadget with the selected replay limit as 3, targetting channel "cn"}{3}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {IV}Case Studies}{3}{}\protected@file@percent }
|
||||
\newlabel{sec:case_studies}{{IV}{3}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-A}}SCTP}{3}{}\protected@file@percent }
|
||||
\newlabel{sub:SCTP}{{\mbox {IV-A}}{3}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-B}}TCP}{3}{}\protected@file@percent }
|
||||
\newlabel{sub:TCP}{{\mbox {IV-B}}{3}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-C}}DCCP}{3}{}\protected@file@percent }
|
||||
\newlabel{sub:DCCP}{{\mbox {IV-C}}{3}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {V}Conclusion}{3}{}\protected@file@percent }
|
||||
\newlabel{sec:conclusion}{{V}{3}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {section}{References}{3}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {III-D}}Custom Attacker Models}{3}{}\protected@file@percent }
|
||||
\newlabel{sub:Custom Attacker Models}{{\mbox {III-D}}{3}{}{}{}}
|
||||
\bibstyle{IEEEtran}
|
||||
\bibdata{main}
|
||||
\bibcite{Lamport_1994}{1}
|
||||
\bibcite{Holzmann_1997}{2}
|
||||
\bibcite{Clarke_Wang}{3}
|
||||
\bibcite{Basin_Cremers_Dreier_Sasse_2022}{4}
|
||||
\bibcite{Blanchet_Smyth_Cheval_Sylvestre}{5}
|
||||
\bibcite{Kobeissi_Nicolas_Tiwari}{6}
|
||||
@@ -59,12 +48,29 @@
|
||||
\bibcite{Vardi_Wolper_1986}{10}
|
||||
\bibcite{clarke2000model}{11}
|
||||
\bibcite{Kozen_1977}{12}
|
||||
\newlabel{lst:korg_rearrange}{{4}{4}{}{}{}}
|
||||
\@writefile{lol}{\contentsline {lstlisting}{\numberline {4}Example rearrange attacker model gadget with the selected replay limit as 3, targetting channel "cn"}{4}{}\protected@file@percent }
|
||||
\newlabel{lst:io-file}{{5}{4}{}{}{}}
|
||||
\@writefile{lol}{\contentsline {lstlisting}{\numberline {5}Example I/O file targetting channel "cn"}{4}{}\protected@file@percent }
|
||||
\newlabel{lst:io-file-synth}{{6}{4}{}{}{}}
|
||||
\@writefile{lol}{\contentsline {lstlisting}{\numberline {6}Example gadget synthesized from an I/O file targetting the channel "cn"}{4}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {IV}Case Studies}{4}{}\protected@file@percent }
|
||||
\newlabel{sec:case_studies}{{IV}{4}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-A}}SCTP}{4}{}\protected@file@percent }
|
||||
\newlabel{sub:SCTP}{{\mbox {IV-A}}{4}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-B}}TCP}{4}{}\protected@file@percent }
|
||||
\newlabel{sub:TCP}{{\mbox {IV-B}}{4}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-C}}DCCP}{4}{}\protected@file@percent }
|
||||
\newlabel{sub:DCCP}{{\mbox {IV-C}}{4}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {V}Conclusion}{4}{}\protected@file@percent }
|
||||
\newlabel{sec:conclusion}{{V}{4}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {section}{References}{4}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {VI}Appendix}{4}{}\protected@file@percent }
|
||||
\newlabel{sec:Appendix}{{VI}{4}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VI-A}}Full Korg Soundness and Completeness Proofs}{4}{}\protected@file@percent }
|
||||
\newlabel{sub:korg_proofs}{{\mbox {VI-A}}{4}{}{}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VI-B}}Preventing Korg Livelocks}{4}{}\protected@file@percent }
|
||||
\newlabel{sub:Preventing Korg Livelocks}{{\mbox {VI-B}}{4}{}{}{}}
|
||||
\newlabel{lst:drop_passer}{{4}{4}{}{}{}}
|
||||
\@writefile{lol}{\contentsline {lstlisting}{\numberline {4}Example dropping attacker model gadget with message skipping}{4}{}\protected@file@percent }
|
||||
\gdef \@abspage@last{4}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VI-B}}Preventing Korg Livelocks}{5}{}\protected@file@percent }
|
||||
\newlabel{sub:Preventing Korg Livelocks}{{\mbox {VI-B}}{5}{}{}{}}
|
||||
\newlabel{lst:drop_passer}{{7}{5}{}{}{}}
|
||||
\@writefile{lol}{\contentsline {lstlisting}{\numberline {7}Example dropping attacker model gadget with message skipping}{5}{}\protected@file@percent }
|
||||
\gdef \@abspage@last{5}
|
||||
|
||||
Reference in New Issue
Block a user