more
This commit is contained in:
70
main.tex
70
main.tex
@@ -1,6 +1,13 @@
|
||||
\documentclass[conference]{IEEEtran}
|
||||
\IEEEoverridecommandlockouts
|
||||
% The preceding line is only needed to identify funding in the first footnote. If that is unneeded, please comment it out.
|
||||
\documentclass[letterpaper,twocolumn,10pt]{article}
|
||||
\usepackage{usenix}
|
||||
|
||||
% to be able to draw some self-contained figs
|
||||
\usepackage{tikz}
|
||||
\usepackage{amsmath}
|
||||
|
||||
% inlined bib file
|
||||
\usepackage{filecontents}
|
||||
|
||||
\usepackage{cite}
|
||||
\usepackage{amsmath,amssymb,amsfonts}
|
||||
\usepackage{algorithmic}
|
||||
@@ -11,6 +18,8 @@
|
||||
\usepackage{xspace}
|
||||
\usepackage{array}
|
||||
\usepackage{comment}
|
||||
\usepackage{tikz}
|
||||
\usepackage{float}
|
||||
|
||||
\usepackage{xcolor,color,xspace,enumerate,centernot,multirow,float,graphicx,
|
||||
xcolor,caption,subcaption,textcomp,pgfplots,pgf-pie,tikz,listings,
|
||||
@@ -25,13 +34,17 @@ comment,adjustbox,mdframed,changepage,algorithm,algorithmic}
|
||||
\usepackage{xurl}
|
||||
%\usepackage{csvsimple}
|
||||
|
||||
|
||||
\renewcommand{\topfraction}{0.9} % Allow more figures at the top
|
||||
\renewcommand{\textfraction}{0.1} % Allow more text alongside figures
|
||||
\renewcommand{\floatpagefraction}{0.8} % Reduce the likelihood of figures moving to the end
|
||||
\newtheorem{definition}{Definition}
|
||||
|
||||
\newcommand{\cnr}[1]{\textcolor{blue}{Cristina says: {#1}}}
|
||||
\newcommand{\mvh}[1]{\textcolor{magenta}{Max says: {#1}}}
|
||||
\newcommand{\jg}[1]{\textcolor{purple}{Jake says: {#1}}}
|
||||
\newcommand{\spin}[0]{\textsc{Spin}\xspace}
|
||||
\newcommand{\korg}[0]{\textsc{Korg}\xspace}
|
||||
\newcommand{\korg}[0]{\textsc{Panda}\xspace}
|
||||
\newcommand{\promela}[0]{\textsc{Promela}\xspace}
|
||||
|
||||
\usepackage{listings}
|
||||
@@ -62,22 +75,33 @@ comment,adjustbox,mdframed,changepage,algorithm,algorithmic}
|
||||
|
||||
\def\BibTeX{{\rm B\kern-.05em{\sc i\kern-.025em b}\kern-.08em
|
||||
T\kern-.1667em\lower.7ex\hbox{E}\kern-.125emX}}
|
||||
|
||||
|
||||
%-------------------------------------------------------------------------------
|
||||
\begin{document}
|
||||
%-------------------------------------------------------------------------------
|
||||
|
||||
\title{\korg: An Attack Synthesis Tool\\ for Distributed Protocols\\\\
|
||||
\LARGE Tool Paper
|
||||
}
|
||||
%don't want date printed
|
||||
\date{}
|
||||
|
||||
% make title bold and 14 pt font (Latex default is non-bold, 16 pt)
|
||||
\title{\korg: An Attack Synthesis Tool\\ for Distributed Protocols\footnote{\korg is an anonymized name for double-blind submission.}}
|
||||
|
||||
\author{\IEEEauthorblockN{Jacob Ginesin}
|
||||
\IEEEauthorblockA{\textit{Northeastern University}}
|
||||
%for single author (just remove % characters)
|
||||
\author{
|
||||
{\rm Jacob Ginesin}\\
|
||||
Northeastern University
|
||||
\and
|
||||
\IEEEauthorblockN{Max von Hippel}
|
||||
\IEEEauthorblockA{\textit{Northeastern University}}
|
||||
{\rm Max von Hippel}\\
|
||||
Benchify
|
||||
\and
|
||||
\IEEEauthorblockN{Cristina Nita-Rotaru}
|
||||
\IEEEauthorblockA{\textit{Northeastern University}}
|
||||
}
|
||||
{\rm Cristina Nita-Rotaru}\\
|
||||
Northeastern University
|
||||
% copy the following lines to add more authors
|
||||
% \and
|
||||
% {\rm Name}\\
|
||||
%Name Institution
|
||||
} % end author
|
||||
|
||||
\maketitle
|
||||
|
||||
@@ -86,14 +110,15 @@ comment,adjustbox,mdframed,changepage,algorithm,algorithmic}
|
||||
\input{sections/abstract}
|
||||
\end{abstract}
|
||||
|
||||
\begin{IEEEkeywords}
|
||||
Protocols, Attack Synthesis, Denial of Service, Model Checking
|
||||
\end{IEEEkeywords}
|
||||
|
||||
\section{Introduction}
|
||||
\label{sec:introduction}
|
||||
\input{sections/introduction}
|
||||
|
||||
\section{Attacker Gadgets}%
|
||||
\label{sec:Attacker Gadgets}
|
||||
\input{sections/gadgets}
|
||||
|
||||
\section{\korg Architecture}
|
||||
\label{sec:design}
|
||||
\input{sections/design}
|
||||
@@ -106,7 +131,7 @@ Protocols, Attack Synthesis, Denial of Service, Model Checking
|
||||
\label{sec:case_studies}
|
||||
\input{sections/case_studies}
|
||||
|
||||
\section{Proofs of Soundness and Completeness}
|
||||
\section{Theoretical Foundations of \korg}
|
||||
\label{sec:proofs}
|
||||
\input{sections/proofs}
|
||||
|
||||
@@ -119,12 +144,13 @@ Protocols, Attack Synthesis, Denial of Service, Model Checking
|
||||
\input{sections/conclusion}
|
||||
|
||||
|
||||
\bibliographystyle{IEEEtran}
|
||||
\bibliographystyle{plain}
|
||||
\bibliography{main}
|
||||
|
||||
%\section{Appendix}%
|
||||
%\label{sec:Appendix}
|
||||
%\input{sections/appendix}
|
||||
|
||||
|
||||
\end{document}
|
||||
|
||||
%% LocalWords: endnotes includegraphics fread ptr nobj noindent
|
||||
%% LocalWords: pdflatex acks
|
||||
|
||||
|
||||
Reference in New Issue
Block a user