\begin{thebibliography}{10} \bibitem{Arun_Arashloo_Saeed_Alizadeh_Balakrishnan_2021} Venkat Arun, Mina~Tahmasbi Arashloo, Ahmed Saeed, Mohammad Alizadeh, and Hari Balakrishnan. \newblock Toward formally verifying congestion control behavior. \newblock In {\em Proceedings of the 2021 ACM SIGCOMM 2021 Conference}, page 1–16, Virtual Event USA, August 2021. ACM. \bibitem{ParnoSOK} Manuel Barbosa, Gilles Barthe, Karthik Bhargavan, Bruno Blanchet, Cas Cremers, Kevin Liao, and Bryan Parno. \newblock Sok: Computer-aided cryptography. \newblock In {\em 2021 IEEE Symposium on Security and Privacy (SP)}, page 777–795, May 2021. \bibitem{Tamarin} David Basin, Cas Cremers, Jannik Dreier, and Ralf Sasse. \newblock Tamarin: Verification of large-scale, real-world, cryptographic protocols. \newblock {\em IEEE Security \& Privacy}, 20(3):24–32, May 2022. \bibitem{Basin_Cremers_Meadows_2018} David Basin, Cas Cremers, and Catherine Meadows. \newblock {\em Model Checking Security Protocols}, page 727–762. \newblock Springer International Publishing, Cham, 2018. \bibitem{Henda} Noomene Ben~Henda. \newblock Generic and efficient attacker models in spin. \newblock In {\em Proceedings of the 2014 International SPIN Symposium on Model Checking of Software}, page 77–86, San Jose CA USA, July 2014. ACM. \bibitem{Beurdouche} Benjamin Beurdouche. \newblock Formal verification for high assurance security software in fstar. \bibitem{Blanchet_Jacomme} Bruno Blanchet and Charlie Jacomme. \newblock Cryptoverif: a computationally-sound security protocol verifier. \bibitem{Proverif} Bruno Blanchet, Ben Smyth, Vincent Cheval, and Marc Sylvestre. \newblock Proverif 2.05: Automatic cryptographic protocol verifier, user manual and tutorial. \bibitem{mCRL2} Olav Bunte, Jan~Friso Groote, Jeroen J.~A. Keiren, Maurice Laveaux, Thomas Neele, Erik~P. De~Vink, Wieger Wesselink, Anton Wijs, and Tim A.~C. Willemse. \newblock {\em The mCRL2 Toolset for Analysing Concurrent Systems: Improvements in Expressivity and Usability}, volume 11428 of {\em Lecture Notes in Computer Science}, page 21–39. \newblock Springer International Publishing, Cham, 2019. \bibitem{Castro_Liskov_2002} Miguel Castro and Barbara Liskov. \newblock Practical byzantine fault tolerance and proactive recovery. \newblock {\em ACM Transactions on Computer Systems}, 20(4):398–461, November 2002. \bibitem{Clarke_Wang} Edmund~M Clarke and Qinsi Wang. \newblock 25 years of model checking. \bibitem{Cluzel_Georgiou_Moy_Zeller_2021} Guillaume Cluzel, Kyriakos Georgiou, Yannick Moy, and Clément Zeller. \newblock Layered formal verification of a tcp stack. \newblock In {\em 2021 IEEE Secure Development Conference (SecDev)}, page 86–93, Atlanta, GA, USA, October 2021. IEEE. \bibitem{Cremers} Cas J.~F. Cremers. \newblock {\em The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols}, volume 5123 of {\em Lecture Notes in Computer Science}, page 414–418. \newblock Springer Berlin Heidelberg, Berlin, Heidelberg, 2008. \bibitem{Delzanno_Tatarek_Traverso_2014} Giorgio Delzanno, Michele Tatarek, and Riccardo Traverso. \newblock Model checking paxos in spin. \newblock {\em Electronic Proceedings in Theoretical Computer Science}, 161:131–146, August 2014. \bibitem{Ginesin2024} Jacob Ginesin, Max von Hippel, Evan Defloor, Cristina Nita-Rotaru, and Michael Tüxen. \newblock A formal analysis of sctp: Attack synthesis and patch verification. \newblock (arXiv:2403.05663), March 2024. \newblock arXiv:2403.05663 [cs]. \bibitem{Ginesin} Jacob Ginesin, Max von Hippel, Evan Defloor, Cristina Nita-Rotaru, and Michael Tüxen. \newblock A formal analysis of sctp: Attack synthesis and patch verification. \newblock (arXiv:2403.05663), March 2024. \newblock arXiv:2403.05663 [cs]. \bibitem{ironfleet} Chris Hawblitzel, Jon Howell, Manos Kapritsos, Jacob~R. Lorch, Bryan Parno, Michael~L. Roberts, Srinath Setty, and Brian Zill. \newblock Ironfleet: proving practical distributed systems correct. \newblock In {\em Proceedings of the 25th Symposium on Operating Systems Principles}, page 1–17, Monterey California, October 2015. ACM. \bibitem{Holzmann_2014} Gerard~J. Holzmann. \newblock Mars code. \newblock {\em Communications of the ACM}, 57(2):64–73, February 2014. \bibitem{Holzmann_Smith_2000} Gerard~J. Holzmann and Margaret~H. Smith. \newblock Automating software feature verification. \newblock {\em Bell Labs Technical Journal}, 5(2):72–87, 2000. \bibitem{Holzmann_1997} G.J. Holzmann. \newblock The model checker spin. \newblock {\em IEEE Transactions on Software Engineering}, 23(5):279–295, May 1997. \bibitem{Hsieh_Mitra_2019} Chiao Hsieh and Sayan Mitra. \newblock {\em Dione: A Protocol Verification System Built with Dafny for I/O Automata}, volume 11918 of {\em Lecture Notes in Computer Science}, page 227–245. \newblock Springer International Publishing, Cham, 2019. \bibitem{TCPwn} Samuel Jero, Endadul Hoque, David Choffnes, Alan Mislove, and Cristina Nita-Rotaru. \newblock Automated attack discovery in tcp congestion control using a model-guided approach. \newblock In {\em Proceedings 2018 Network and Distributed System Security Symposium}, San Diego, CA, 2018. Internet Society. \bibitem{Khan_Mukund_Suresh_2005} Abdul~Sahid Khan, Madhavan Mukund, and S.~P. Suresh. \newblock {\em Generic Verification of Security Protocols}, volume 3639 of {\em Lecture Notes in Computer Science}, page 221–235. \newblock Springer Berlin Heidelberg, Berlin, Heidelberg, 2005. \bibitem{Kobeissi_Nicolas_Tiwari} Nadim Kobeissi, Georgio Nicolas, and Mukesh Tiwari. \newblock Verifpal: Cryptographic protocol analysis for the real world. \bibitem{Kozen_1977} Dexter Kozen. \newblock Lower bounds for natural proof systems. \newblock In {\em 18th Annual Symposium on Foundations of Computer Science (sfcs 1977)}, page 254–266, Providence, RI, USA, September 1977. IEEE. \bibitem{Narayana_Chen_Zhao_Chen_Fu_Zhou_2006} Prasad Narayana, Ruiming Chen, Yao Zhao, Yan Chen, Zhi Fu, and Hai Zhou. \newblock Automatic vulnerability checking of ieee 802.16 wimax protocols through tla+. \newblock In {\em 2006 2nd IEEE Workshop on Secure Network Protocols}, page 44–49, November 2006. \bibitem{Ongaro} Diego Ongaro. \newblock Consensus: Bridging theory and practice. \bibitem{Ongaro_Ousterhout} Diego Ongaro and John Ousterhout. \newblock In search of an understandable consensus algorithm. \bibitem{Pacheco2022} Maria~Leonor Pacheco, Max~Von Hippel, Ben Weintraub, Dan Goldwasser, and Cristina Nita-Rotaru. \newblock Automated attack synthesis by extracting finite state machines from protocol specification documents. \newblock In {\em 2022 IEEE Symposium on Security and Privacy (SP)}, page 51–68, San Francisco, CA, USA, May 2022. IEEE. \bibitem{Pereira} Vitor Pereira. \newblock Easycrypt - a (brief) tutorial. \bibitem{Rahli_Vukotic_Völp_Esteves-Verissimo_2018} Vincent Rahli, Ivana Vukotic, Marcus Völp, and Paulo Esteves-Verissimo. \newblock {\em Velisarios: Byzantine Fault-Tolerant Protocols Powered by Coq}, volume 10801 of {\em Lecture Notes in Computer Science}, page 619–650. \newblock Springer International Publishing, Cham, 2018. \bibitem{Sergey_Wilcox_Tatlock_2018} Ilya Sergey, James~R. Wilcox, and Zachary Tatlock. \newblock Programming and proving with distributed protocols. \newblock {\em Proceedings of the ACM on Programming Languages}, 2(POPL):1–30, January 2018. \bibitem{Smith_1997} Mark Anthony~Shawn Smith. \newblock {\em Formal verification of TCP and T/TCP}. \newblock Thesis, Massachusetts Institute of Technology, 1997. \newblock Accepted: 2008-09-03T18:09:43Z. \bibitem{mcp} W.~Visser, K.~Havelund, G.~Brat, and Seungjoon Park. \newblock Model checking programs. \newblock In {\em Proceedings ASE 2000. Fifteenth IEEE International Conference on Automated Software Engineering}, page 3–11, Grenoble, France, 2000. IEEE. \bibitem{Hippel2022} Max von Hippel, Cole Vick, Stavros Tripakis, and Cristina Nita-Rotaru. \newblock Automated attacker synthesis for distributed protocols. \newblock (arXiv:2004.01220), April 2022. \newblock arXiv:2004.01220 [cs]. \bibitem{message_queues_TLA} Hillel Wayne. \newblock Tla+ message passing, October 2018. \bibitem{wayne_adversaries} Hillel Wayne. \newblock Modeling adversaries with tla+. \newblock \url{https://www.hillelwayne.com/post/adversaries/}, 2019. \newblock Accessed: 2024-12-03. \bibitem{Wilcox_Woos_Panchekha_Tatlock_Wang_Ernst_Anderson} James~R Wilcox, Doug Woos, Pavel Panchekha, Zachary Tatlock, Xi~Wang, Michael~D Ernst, and Thomas Anderson. \newblock Verdi: A framework for implementing and formally verifying distributed systems. \bibitem{Woos_Wilcox_Anton_Tatlock_Ernst_Anderson_2016} Doug Woos, James~R. Wilcox, Steve Anton, Zachary Tatlock, Michael~D. Ernst, and Thomas Anderson. \newblock Planning for change in a formal verification of the raft consensus protocol. \newblock In {\em Proceedings of the 5th ACM SIGPLAN Conference on Certified Programs and Proofs}, page 154–165, St. Petersburg FL USA, January 2016. ACM. \end{thebibliography}