46 lines
3.1 KiB
TeX
46 lines
3.1 KiB
TeX
\relax
|
|
\@writefile{toc}{\contentsline {section}{\numberline {I}Introduction}{1}{}\protected@file@percent }
|
|
\newlabel{sec:introduction}{{I}{1}{}{}{}}
|
|
\@writefile{toc}{\contentsline {section}{\numberline {II}Design Methodology}{1}{}\protected@file@percent }
|
|
\newlabel{sec:design}{{II}{1}{}{}{}}
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {II-A}}High-level design}{1}{}\protected@file@percent }
|
|
\newlabel{sub:High-level design}{{\mbox {II-A}}{1}{}{}{}}
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {II-B}}The Korg Implementation}{1}{}\protected@file@percent }
|
|
\newlabel{sub:The Korg Implementation}{{\mbox {II-B}}{1}{}{}{}}
|
|
\newlabel{lst:spin-model}{{1}{1}{}{}{}}
|
|
\@writefile{lol}{\contentsline {lstlisting}{\numberline {1}Example \textsc {Promela}\xspace model of peers communicating over a channel}{1}{}\protected@file@percent }
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {II-C}}Soundness And Completeness of Korg}{1}{}\protected@file@percent }
|
|
\newlabel{sub:Soundness And Completeness}{{\mbox {II-C}}{1}{}{}{}}
|
|
\citation{Vardi_Wolper_1986}
|
|
\citation{Vardi_Wolper_1986,clarke2000model}
|
|
\citation{Kozen_1977}
|
|
\bibstyle{IEEEtran}
|
|
\bibdata{main}
|
|
\bibcite{Vardi_Wolper_1986}{1}
|
|
\bibcite{clarke2000model}{2}
|
|
\bibcite{Kozen_1977}{3}
|
|
\@writefile{toc}{\contentsline {section}{\numberline {III}Attacker Models}{2}{}\protected@file@percent }
|
|
\newlabel{sec:usage_attacker_models}{{III}{2}{}{}{}}
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {III-A}}Custom Attacker Models}{2}{}\protected@file@percent }
|
|
\newlabel{sub:Custom Attacker Models}{{\mbox {III-A}}{2}{}{}{}}
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {III-B}}Replaying Attacker Model}{2}{}\protected@file@percent }
|
|
\newlabel{sub:Replay Attacker}{{\mbox {III-B}}{2}{}{}{}}
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {III-C}}Rearranging Attacker Model}{2}{}\protected@file@percent }
|
|
\newlabel{sub:Rearrange Attacker}{{\mbox {III-C}}{2}{}{}{}}
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {III-D}}Dropping Attacker Model}{2}{}\protected@file@percent }
|
|
\newlabel{sub:Dropping Attacker}{{\mbox {III-D}}{2}{}{}{}}
|
|
\@writefile{toc}{\contentsline {section}{\numberline {IV}Case Studies}{2}{}\protected@file@percent }
|
|
\newlabel{sec:case_studies}{{IV}{2}{}{}{}}
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-A}}SCTP}{2}{}\protected@file@percent }
|
|
\newlabel{sub:SCTP}{{\mbox {IV-A}}{2}{}{}{}}
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-B}}TCP}{2}{}\protected@file@percent }
|
|
\newlabel{sub:TCP}{{\mbox {IV-B}}{2}{}{}{}}
|
|
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-C}}DCCP}{2}{}\protected@file@percent }
|
|
\newlabel{sub:DCCP}{{\mbox {IV-C}}{2}{}{}{}}
|
|
\@writefile{toc}{\contentsline {section}{\numberline {V}Usage}{2}{}\protected@file@percent }
|
|
\newlabel{sec:Usage}{{V}{2}{}{}{}}
|
|
\@writefile{toc}{\contentsline {section}{\numberline {VI}Conclusion}{2}{}\protected@file@percent }
|
|
\newlabel{sec:conclusion}{{VI}{2}{}{}{}}
|
|
\@writefile{toc}{\contentsline {section}{References}{2}{}\protected@file@percent }
|
|
\gdef \@abspage@last{2}
|