\relax \citation{Lamport_1994,Holzmann_1997,Clarke_Wang} \citation{Basin_Cremers_Dreier_Sasse_2022,Blanchet_Smyth_Cheval_Sylvestre,Kobeissi_Nicolas_Tiwari,Blanchet_Jacomme,Basin_Linker_Sasse} \citation{Hippel2022} \@writefile{toc}{\contentsline {section}{\numberline {I}Introduction}{1}{}\protected@file@percent } \newlabel{sec:introduction}{{I}{1}{}{}{}} \@writefile{toc}{\contentsline {section}{\numberline {II}Design Methodology}{1}{}\protected@file@percent } \newlabel{sec:design}{{II}{1}{}{}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {II-A}}High-level design}{1}{}\protected@file@percent } \newlabel{sub:High-level design}{{\mbox {II-A}}{1}{}{}{}} \@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces A high-level overview of the \textsc {Korg}\xspace workflow}}{1}{}\protected@file@percent } \newlabel{fig:korg_workflow}{{1}{1}{}{}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {II-B}}Soundness And Completeness of Korg}{1}{}\protected@file@percent } \newlabel{sub:Soundness And Completeness}{{\mbox {II-B}}{1}{}{}{}} \citation{Kozen_1977} \citation{Clarke_Wang} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {II-C}}The Korg Implementation}{2}{}\protected@file@percent } \newlabel{sub:The Korg Implementation}{{\mbox {II-C}}{2}{}{}{}} \newlabel{lst:spin-model}{{1}{2}{}{}{}} \@writefile{lol}{\contentsline {lstlisting}{\numberline {1}Example \textsc {Promela}\xspace model of peers communicating over a channel}{2}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {II-D}}Usage}{2}{}\protected@file@percent } \newlabel{sub:Usage}{{\mbox {II-D}}{2}{}{}{}} \@writefile{toc}{\contentsline {section}{\numberline {III}Attacker Models}{2}{}\protected@file@percent } \newlabel{sec:usage_attacker_models}{{III}{2}{}{}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {III-A}}Dropping Attacker Model}{2}{}\protected@file@percent } \newlabel{sub:Dropping Attacker}{{\mbox {III-A}}{2}{}{}{}} \newlabel{lst:korg_drop}{{2}{3}{}{}{}} \@writefile{lol}{\contentsline {lstlisting}{\numberline {2}Example dropping attacker model gadget with drop limit of 3, targetting channel "cn"}{3}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {III-B}}Replaying Attacker Model}{3}{}\protected@file@percent } \newlabel{sub:Replay Attacker}{{\mbox {III-B}}{3}{}{}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {III-C}}Rearranging Attacker Model}{3}{}\protected@file@percent } \newlabel{sub:Rearrange Attacker}{{\mbox {III-C}}{3}{}{}{}} \newlabel{lst:korg_replay}{{3}{3}{}{}{}} \@writefile{lol}{\contentsline {lstlisting}{\numberline {3}Example replay attacker model gadget with the selected replay limit as 3, targetting channel "cn"}{3}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {III-D}}Custom Attacker Models}{3}{}\protected@file@percent } \newlabel{sub:Custom Attacker Models}{{\mbox {III-D}}{3}{}{}{}} \bibstyle{IEEEtran} \bibdata{main} \bibcite{Lamport_1994}{1} \bibcite{Holzmann_1997}{2} \bibcite{Clarke_Wang}{3} \bibcite{Basin_Cremers_Dreier_Sasse_2022}{4} \bibcite{Blanchet_Smyth_Cheval_Sylvestre}{5} \bibcite{Kobeissi_Nicolas_Tiwari}{6} \bibcite{Blanchet_Jacomme}{7} \bibcite{Basin_Linker_Sasse}{8} \bibcite{Hippel2022}{9} \bibcite{Vardi_Wolper_1986}{10} \bibcite{clarke2000model}{11} \bibcite{Kozen_1977}{12} \newlabel{lst:korg_rearrange}{{4}{4}{}{}{}} \@writefile{lol}{\contentsline {lstlisting}{\numberline {4}Example rearrange attacker model gadget with the selected replay limit as 3, targetting channel "cn"}{4}{}\protected@file@percent } \newlabel{lst:io-file}{{5}{4}{}{}{}} \@writefile{lol}{\contentsline {lstlisting}{\numberline {5}Example I/O file targetting channel "cn"}{4}{}\protected@file@percent } \newlabel{lst:io-file-synth}{{6}{4}{}{}{}} \@writefile{lol}{\contentsline {lstlisting}{\numberline {6}Example gadget synthesized from an I/O file targetting the channel "cn"}{4}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {IV}Case Studies}{4}{}\protected@file@percent } \newlabel{sec:case_studies}{{IV}{4}{}{}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-A}}SCTP}{4}{}\protected@file@percent } \newlabel{sub:SCTP}{{\mbox {IV-A}}{4}{}{}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-B}}TCP}{4}{}\protected@file@percent } \newlabel{sub:TCP}{{\mbox {IV-B}}{4}{}{}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-C}}DCCP}{4}{}\protected@file@percent } \newlabel{sub:DCCP}{{\mbox {IV-C}}{4}{}{}{}} \@writefile{toc}{\contentsline {section}{\numberline {V}Conclusion}{4}{}\protected@file@percent } \newlabel{sec:conclusion}{{V}{4}{}{}{}} \@writefile{toc}{\contentsline {section}{References}{4}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {VI}Appendix}{4}{}\protected@file@percent } \newlabel{sec:Appendix}{{VI}{4}{}{}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VI-A}}Full Korg Soundness and Completeness Proofs}{4}{}\protected@file@percent } \newlabel{sub:korg_proofs}{{\mbox {VI-A}}{4}{}{}{}} \@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {VI-B}}Preventing Korg Livelocks}{5}{}\protected@file@percent } \newlabel{sub:Preventing Korg Livelocks}{{\mbox {VI-B}}{5}{}{}{}} \newlabel{lst:drop_passer}{{7}{5}{}{}{}} \@writefile{lol}{\contentsline {lstlisting}{\numberline {7}Example dropping attacker model gadget with message skipping}{5}{}\protected@file@percent } \gdef \@abspage@last{5}