Files
korg-paper/main.bbl
Your Name 5d4ea50fb3 more
2025-03-03 23:52:29 -05:00

242 lines
9.2 KiB
Plaintext
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

\begin{thebibliography}{10}
\bibitem{Arun_Arashloo_Saeed_Alizadeh_Balakrishnan_2021}
Venkat Arun, Mina~Tahmasbi Arashloo, Ahmed Saeed, Mohammad Alizadeh, and Hari
Balakrishnan.
\newblock Toward formally verifying congestion control behavior.
\newblock In {\em Proceedings of the 2021 ACM SIGCOMM 2021 Conference}, page
116, Virtual Event USA, August 2021. ACM.
\bibitem{ParnoSOK}
Manuel Barbosa, Gilles Barthe, Karthik Bhargavan, Bruno Blanchet, Cas Cremers,
Kevin Liao, and Bryan Parno.
\newblock Sok: Computer-aided cryptography.
\newblock In {\em 2021 IEEE Symposium on Security and Privacy (SP)}, page
777795, May 2021.
\bibitem{Tamarin}
David Basin, Cas Cremers, Jannik Dreier, and Ralf Sasse.
\newblock Tamarin: Verification of large-scale, real-world, cryptographic
protocols.
\newblock {\em IEEE Security \& Privacy}, 20(3):2432, May 2022.
\bibitem{Basin_Cremers_Meadows_2018}
David Basin, Cas Cremers, and Catherine Meadows.
\newblock {\em Model Checking Security Protocols}, page 727762.
\newblock Springer International Publishing, Cham, 2018.
\bibitem{Henda}
Noomene Ben~Henda.
\newblock Generic and efficient attacker models in spin.
\newblock In {\em Proceedings of the 2014 International SPIN Symposium on Model
Checking of Software}, page 7786, San Jose CA USA, July 2014. ACM.
\bibitem{Beurdouche}
Benjamin Beurdouche.
\newblock Formal verification for high assurance security software in fstar.
\bibitem{Blanchet_Jacomme}
Bruno Blanchet and Charlie Jacomme.
\newblock Cryptoverif: a computationally-sound security protocol verifier.
\bibitem{Proverif}
Bruno Blanchet, Ben Smyth, Vincent Cheval, and Marc Sylvestre.
\newblock Proverif 2.05: Automatic cryptographic protocol verifier, user manual
and tutorial.
\bibitem{mCRL2}
Olav Bunte, Jan~Friso Groote, Jeroen J.~A. Keiren, Maurice Laveaux, Thomas
Neele, Erik~P. De~Vink, Wieger Wesselink, Anton Wijs, and Tim A.~C. Willemse.
\newblock {\em The mCRL2 Toolset for Analysing Concurrent Systems: Improvements
in Expressivity and Usability}, volume 11428 of {\em Lecture Notes in
Computer Science}, page 2139.
\newblock Springer International Publishing, Cham, 2019.
\bibitem{Castro_Liskov_2002}
Miguel Castro and Barbara Liskov.
\newblock Practical byzantine fault tolerance and proactive recovery.
\newblock {\em ACM Transactions on Computer Systems}, 20(4):398461, November
2002.
\bibitem{Clarke_Wang}
Edmund~M Clarke and Qinsi Wang.
\newblock 25 years of model checking.
\bibitem{Cluzel_Georgiou_Moy_Zeller_2021}
Guillaume Cluzel, Kyriakos Georgiou, Yannick Moy, and Clément Zeller.
\newblock Layered formal verification of a tcp stack.
\newblock In {\em 2021 IEEE Secure Development Conference (SecDev)}, page
8693, Atlanta, GA, USA, October 2021. IEEE.
\bibitem{Cremers}
Cas J.~F. Cremers.
\newblock {\em The Scyther Tool: Verification, Falsification, and Analysis of
Security Protocols}, volume 5123 of {\em Lecture Notes in Computer Science},
page 414418.
\newblock Springer Berlin Heidelberg, Berlin, Heidelberg, 2008.
\bibitem{Delzanno_Tatarek_Traverso_2014}
Giorgio Delzanno, Michele Tatarek, and Riccardo Traverso.
\newblock Model checking paxos in spin.
\newblock {\em Electronic Proceedings in Theoretical Computer Science},
161:131146, August 2014.
\bibitem{Ginesin2024}
Jacob Ginesin, Max von Hippel, Evan Defloor, Cristina Nita-Rotaru, and Michael
Tüxen.
\newblock A formal analysis of sctp: Attack synthesis and patch verification.
\newblock (arXiv:2403.05663), March 2024.
\newblock arXiv:2403.05663 [cs].
\bibitem{Ginesin}
Jacob Ginesin, Max von Hippel, Evan Defloor, Cristina Nita-Rotaru, and Michael
Tüxen.
\newblock A formal analysis of sctp: Attack synthesis and patch verification.
\newblock (arXiv:2403.05663), March 2024.
\newblock arXiv:2403.05663 [cs].
\bibitem{ironfleet}
Chris Hawblitzel, Jon Howell, Manos Kapritsos, Jacob~R. Lorch, Bryan Parno,
Michael~L. Roberts, Srinath Setty, and Brian Zill.
\newblock Ironfleet: proving practical distributed systems correct.
\newblock In {\em Proceedings of the 25th Symposium on Operating Systems
Principles}, page 117, Monterey California, October 2015. ACM.
\bibitem{Holzmann_2014}
Gerard~J. Holzmann.
\newblock Mars code.
\newblock {\em Communications of the ACM}, 57(2):6473, February 2014.
\bibitem{Holzmann_Smith_2000}
Gerard~J. Holzmann and Margaret~H. Smith.
\newblock Automating software feature verification.
\newblock {\em Bell Labs Technical Journal}, 5(2):7287, 2000.
\bibitem{Holzmann_1997}
G.J. Holzmann.
\newblock The model checker spin.
\newblock {\em IEEE Transactions on Software Engineering}, 23(5):279295, May
1997.
\bibitem{Hsieh_Mitra_2019}
Chiao Hsieh and Sayan Mitra.
\newblock {\em Dione: A Protocol Verification System Built with Dafny for I/O
Automata}, volume 11918 of {\em Lecture Notes in Computer Science}, page
227245.
\newblock Springer International Publishing, Cham, 2019.
\bibitem{TCPwn}
Samuel Jero, Endadul Hoque, David Choffnes, Alan Mislove, and Cristina
Nita-Rotaru.
\newblock Automated attack discovery in tcp congestion control using a
model-guided approach.
\newblock In {\em Proceedings 2018 Network and Distributed System Security
Symposium}, San Diego, CA, 2018. Internet Society.
\bibitem{Khan_Mukund_Suresh_2005}
Abdul~Sahid Khan, Madhavan Mukund, and S.~P. Suresh.
\newblock {\em Generic Verification of Security Protocols}, volume 3639 of {\em
Lecture Notes in Computer Science}, page 221235.
\newblock Springer Berlin Heidelberg, Berlin, Heidelberg, 2005.
\bibitem{Kobeissi_Nicolas_Tiwari}
Nadim Kobeissi, Georgio Nicolas, and Mukesh Tiwari.
\newblock Verifpal: Cryptographic protocol analysis for the real world.
\bibitem{Kozen_1977}
Dexter Kozen.
\newblock Lower bounds for natural proof systems.
\newblock In {\em 18th Annual Symposium on Foundations of Computer Science
(sfcs 1977)}, page 254266, Providence, RI, USA, September 1977. IEEE.
\bibitem{Narayana_Chen_Zhao_Chen_Fu_Zhou_2006}
Prasad Narayana, Ruiming Chen, Yao Zhao, Yan Chen, Zhi Fu, and Hai Zhou.
\newblock Automatic vulnerability checking of ieee 802.16 wimax protocols
through tla+.
\newblock In {\em 2006 2nd IEEE Workshop on Secure Network Protocols}, page
4449, November 2006.
\bibitem{Ongaro}
Diego Ongaro.
\newblock Consensus: Bridging theory and practice.
\bibitem{Ongaro_Ousterhout}
Diego Ongaro and John Ousterhout.
\newblock In search of an understandable consensus algorithm.
\bibitem{Pacheco2022}
Maria~Leonor Pacheco, Max~Von Hippel, Ben Weintraub, Dan Goldwasser, and
Cristina Nita-Rotaru.
\newblock Automated attack synthesis by extracting finite state machines from
protocol specification documents.
\newblock In {\em 2022 IEEE Symposium on Security and Privacy (SP)}, page
5168, San Francisco, CA, USA, May 2022. IEEE.
\bibitem{Pereira}
Vitor Pereira.
\newblock Easycrypt - a (brief) tutorial.
\bibitem{Rahli_Vukotic_Völp_Esteves-Verissimo_2018}
Vincent Rahli, Ivana Vukotic, Marcus Völp, and Paulo Esteves-Verissimo.
\newblock {\em Velisarios: Byzantine Fault-Tolerant Protocols Powered by Coq},
volume 10801 of {\em Lecture Notes in Computer Science}, page 619650.
\newblock Springer International Publishing, Cham, 2018.
\bibitem{Sergey_Wilcox_Tatlock_2018}
Ilya Sergey, James~R. Wilcox, and Zachary Tatlock.
\newblock Programming and proving with distributed protocols.
\newblock {\em Proceedings of the ACM on Programming Languages},
2(POPL):130, January 2018.
\bibitem{Smith_1997}
Mark Anthony~Shawn Smith.
\newblock {\em Formal verification of TCP and T/TCP}.
\newblock Thesis, Massachusetts Institute of Technology, 1997.
\newblock Accepted: 2008-09-03T18:09:43Z.
\bibitem{rfc9260}
M.~Tüxen, R.~Stewart, K.~Nielsen, R.~Jesup, and S.~Loreto.
\newblock {Stream Control Transmission Protocol (SCTP) Specification Errata and
Issues}.
\newblock Request for Comments, June 2022.
\bibitem{mcp}
W.~Visser, K.~Havelund, G.~Brat, and Seungjoon Park.
\newblock Model checking programs.
\newblock In {\em Proceedings ASE 2000. Fifteenth IEEE International Conference
on Automated Software Engineering}, page 311, Grenoble, France, 2000.
IEEE.
\bibitem{Hippel2022}
Max von Hippel, Cole Vick, Stavros Tripakis, and Cristina Nita-Rotaru.
\newblock Automated attacker synthesis for distributed protocols.
\newblock (arXiv:2004.01220), April 2022.
\newblock arXiv:2004.01220 [cs].
\bibitem{message_queues_TLA}
Hillel Wayne.
\newblock Tla+ message passing, October 2018.
\bibitem{wayne_adversaries}
Hillel Wayne.
\newblock Modeling adversaries with tla+.
\newblock \url{https://www.hillelwayne.com/post/adversaries/}, 2019.
\newblock Accessed: 2024-12-03.
\bibitem{Wilcox_Woos_Panchekha_Tatlock_Wang_Ernst_Anderson}
James~R Wilcox, Doug Woos, Pavel Panchekha, Zachary Tatlock, Xi~Wang, Michael~D
Ernst, and Thomas Anderson.
\newblock Verdi: A framework for implementing and formally verifying
distributed systems.
\bibitem{Woos_Wilcox_Anton_Tatlock_Ernst_Anderson_2016}
Doug Woos, James~R. Wilcox, Steve Anton, Zachary Tatlock, Michael~D. Ernst, and
Thomas Anderson.
\newblock Planning for change in a formal verification of the raft consensus
protocol.
\newblock In {\em Proceedings of the 5th ACM SIGPLAN Conference on Certified
Programs and Proofs}, page 154165, St. Petersburg FL USA, January 2016.
ACM.
\end{thebibliography}