more
This commit is contained in:
@@ -23,8 +23,6 @@ For our analysis, we borrow the four LTL properties used in \cite{Pacheco2022},
|
||||
We evaluated the TCP \promela model against \korg's drop, replay, and reordering attacker models on a single uni-directional communication channel. The resulting breakdown of attacks discovered is shown in Figure \ref{res:tcp-table}.
|
||||
|
||||
%Evaluating the canonical TCP model using \korg led us to identify edge-cases in the connection establishment routine that weren't accounted for, leading us to construct a "revised" TCP model accounting for these missing edge cases.
|
||||
|
||||
|
||||
\begin{figure}[h!]
|
||||
\centering
|
||||
\label{res:tcp-table}
|
||||
|
||||
Reference in New Issue
Block a user