% Generated by IEEEtran.bst, version: 1.14 (2015/08/26) \begin{thebibliography}{10} \providecommand{\url}[1]{#1} \csname url@samestyle\endcsname \providecommand{\newblock}{\relax} \providecommand{\bibinfo}[2]{#2} \providecommand{\BIBentrySTDinterwordspacing}{\spaceskip=0pt\relax} \providecommand{\BIBentryALTinterwordstretchfactor}{4} \providecommand{\BIBentryALTinterwordspacing}{\spaceskip=\fontdimen2\font plus \BIBentryALTinterwordstretchfactor\fontdimen3\font minus \fontdimen4\font\relax} \providecommand{\BIBforeignlanguage}[2]{{% \expandafter\ifx\csname l@#1\endcsname\relax \typeout{** WARNING: IEEEtran.bst: No hyphenation pattern has been}% \typeout{** loaded for the language `#1'. Using the pattern for}% \typeout{** the default language instead.}% \else \language=\csname l@#1\endcsname \fi #2}} \providecommand{\BIBdecl}{\relax} \BIBdecl \bibitem{Lamport_1994} L.~Lamport, ``\BIBforeignlanguage{en}{The temporal logic of actions},'' \emph{\BIBforeignlanguage{en}{ACM Transactions on Programming Languages and Systems}}, vol.~16, no.~3, p. 872–923, May 1994. \bibitem{Holzmann_1997} G.~Holzmann, ``\BIBforeignlanguage{en}{The model checker spin},'' \emph{\BIBforeignlanguage{en}{IEEE Transactions on Software Engineering}}, vol.~23, no.~5, p. 279–295, May 1997. \bibitem{Clarke_Wang} E.~M. Clarke and Q.~Wang, ``\BIBforeignlanguage{en}{25 years of model checking}.'' \bibitem{Basin_Cremers_Dreier_Sasse_2022} D.~Basin, C.~Cremers, J.~Dreier, and R.~Sasse, ``\BIBforeignlanguage{en}{Tamarin: Verification of large-scale, real-world, cryptographic protocols},'' \emph{\BIBforeignlanguage{en}{IEEE Security & Privacy}}, vol.~20, no.~3, p. 24–32, May 2022. \bibitem{Blanchet_Smyth_Cheval_Sylvestre} B.~Blanchet, B.~Smyth, V.~Cheval, and M.~Sylvestre, ``\BIBforeignlanguage{en}{Proverif 2.05: Automatic cryptographic protocol verifier, user manual and tutorial}.'' \bibitem{Kobeissi_Nicolas_Tiwari} N.~Kobeissi, G.~Nicolas, and M.~Tiwari, ``\BIBforeignlanguage{en}{Verifpal: Cryptographic protocol analysis for the real world}.'' \bibitem{Blanchet_Jacomme} B.~Blanchet and C.~Jacomme, ``\BIBforeignlanguage{en}{Cryptoverif: a computationally-sound security protocol verifier}.'' \bibitem{Basin_Linker_Sasse} D.~Basin, F.~Linker, and R.~Sasse, ``\BIBforeignlanguage{en}{A formal analysis of the imessage pq3 messaging protocol}.'' \bibitem{Hippel2022} \BIBentryALTinterwordspacing M.~von Hippel, C.~Vick, S.~Tripakis, and C.~Nita-Rotaru, ``Automated attacker synthesis for distributed protocols,'' no. arXiv:2004.01220, Apr. 2022, arXiv:2004.01220 [cs]. [Online]. Available: \url{http://arxiv.org/abs/2004.01220} \BIBentrySTDinterwordspacing \bibitem{Vardi_Wolper_1986} \BIBentryALTinterwordspacing M.~Y. Vardi and P.~Wolper, ``\BIBforeignlanguage{English}{An automata-theoretic approach to automatic program verification}.''\hskip 1em plus 0.5em minus 0.4em\relax IEEE Computer Society, 1986. [Online]. Available: \url{https://orbi.uliege.be/handle/2268/116609} \BIBentrySTDinterwordspacing \bibitem{clarke2000model} E.~M. Clarke, O.~Grumberg, and D.~A. Peled, \emph{Model Checking}.\hskip 1em plus 0.5em minus 0.4em\relax Cambridge, MA: MIT Press, 2000. \bibitem{Kozen_1977} \BIBentryALTinterwordspacing D.~Kozen, ``\BIBforeignlanguage{en}{Lower bounds for natural proof systems},'' in \emph{\BIBforeignlanguage{en}{18th Annual Symposium on Foundations of Computer Science (sfcs 1977)}}.\hskip 1em plus 0.5em minus 0.4em\relax Providence, RI, USA: IEEE, Sep. 1977, p. 254–266. [Online]. Available: \url{http://ieeexplore.ieee.org/document/4567949/} \BIBentrySTDinterwordspacing \end{thebibliography}