81 lines
4.5 KiB
Plaintext
81 lines
4.5 KiB
Plaintext
This is BibTeX, Version 0.99d (TeX Live 2024/Arch Linux)
|
||
Capacity: max_strings=200000, hash_size=200000, hash_prime=170003
|
||
The top-level auxiliary file: main.aux
|
||
The style file: IEEEtran.bst
|
||
Reallocated singl_function (elt_size=8) to 100 items from 50.
|
||
Reallocated singl_function (elt_size=8) to 100 items from 50.
|
||
Reallocated singl_function (elt_size=8) to 100 items from 50.
|
||
Reallocated wiz_functions (elt_size=8) to 6000 items from 3000.
|
||
Reallocated singl_function (elt_size=8) to 100 items from 50.
|
||
Database file #1: main.bib
|
||
Repeated entry---line 49 of file main.bib
|
||
: @article{Clarke_Wang
|
||
: , title={25 Years of Model Checking}, abstractNote={Model Checking is an automatic verification technique for large state transition systems. It was originally developed for reasoning about finite-state concurrent systems. The technique has been used successfully to debug complex computer hardware, communication protocols, and software. It is beginning to be used for analyzing cyberphysical, biological, and financial systems as well. The major challenge for the technique is a phenomenon called the State Explosion Problem. This issue is impossible to avoid in the worst case; but, by using sophisticated data structures and clever search algorithms, it is now possible to verify state transition systems with an astronomical number of states. In this paper, we will briefly review the development of Model Checking over the past 32 years, with an emphasis on model checking stochastic hybrid systems.}, author={Clarke, Edmund M and Wang, Qinsi}, language={en} }
|
||
I'm skipping whatever remains of this entry
|
||
Repeated entry---line 61 of file main.bib
|
||
: @inproceedings{Pacheco2022
|
||
: , address={San Francisco, CA, USA}, title={Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents}, ISBN={978-1-66541-316-9}, url={https://ieeexplore.ieee.org/document/9833673/}, DOI={10.1109/SP46214.2022.9833673}, abstractNote={Automated attack discovery techniques, such as attacker synthesis or model-based fuzzing, provide powerful ways to ensure network protocols operate correctly and securely. Such techniques, in general, require a formal representation of the protocol, often in the form of a finite state machine (FSM). Unfortunately, many protocols are only described in English prose, and implementing even a simple network protocol as an FSM is time-consuming and prone to subtle logical errors. Automatically extracting protocol FSMs from documentation can significantly contribute to increased use of these techniques and result in more robust and secure protocol implementations.}, booktitle={2022 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Pacheco, Maria Leonor and Hippel, Max Von and Weintraub, Ben and Goldwasser, Dan and Nita-Rotaru, Cristina}, year={2022}, month=may, pages={51–68}, language={en} }
|
||
I'm skipping whatever remains of this entry
|
||
-- IEEEtran.bst version 1.14 (2015/08/26) by Michael Shell.
|
||
-- http://www.michaelshell.org/tex/ieeetran/bibtex/
|
||
-- See the "IEEEtran_bst_HOWTO.pdf" manual for usage information.
|
||
Warning--empty journal in Clarke_Wang
|
||
Warning--empty year in Clarke_Wang
|
||
Warning--empty journal in Blanchet_Smyth_Cheval_Sylvestre
|
||
Warning--empty year in Blanchet_Smyth_Cheval_Sylvestre
|
||
Warning--empty journal in Kobeissi_Nicolas_Tiwari
|
||
Warning--empty year in Kobeissi_Nicolas_Tiwari
|
||
Warning--empty journal in Blanchet_Jacomme
|
||
Warning--empty year in Blanchet_Jacomme
|
||
Warning--empty journal in Basin_Linker_Sasse
|
||
Warning--empty year in Basin_Linker_Sasse
|
||
Warning--empty journal in Hippel2022
|
||
Warning--empty journal in Wilcox_Woos_Panchekha_Tatlock_Wang_Ernst_Anderson
|
||
Warning--empty year in Wilcox_Woos_Panchekha_Tatlock_Wang_Ernst_Anderson
|
||
Warning--empty journal in Ongaro
|
||
Warning--empty year in Ongaro
|
||
|
||
Done.
|
||
You've used 16 entries,
|
||
4087 wiz_defined-function locations,
|
||
927 strings with 10593 characters,
|
||
and the built_in function-call counts, 9127 in all, are:
|
||
= -- 739
|
||
> -- 207
|
||
< -- 14
|
||
+ -- 98
|
||
- -- 49
|
||
* -- 519
|
||
:= -- 1420
|
||
add.period$ -- 36
|
||
call.type$ -- 16
|
||
change.case$ -- 18
|
||
chr.to.int$ -- 0
|
||
cite$ -- 31
|
||
duplicate$ -- 786
|
||
empty$ -- 765
|
||
format.name$ -- 60
|
||
if$ -- 2081
|
||
int.to.chr$ -- 0
|
||
int.to.str$ -- 16
|
||
missing$ -- 147
|
||
newline$ -- 83
|
||
num.names$ -- 16
|
||
pop$ -- 385
|
||
preamble$ -- 1
|
||
purify$ -- 0
|
||
quote$ -- 2
|
||
skip$ -- 691
|
||
stack$ -- 0
|
||
substring$ -- 134
|
||
swap$ -- 552
|
||
text.length$ -- 14
|
||
text.prefix$ -- 0
|
||
top$ -- 5
|
||
type$ -- 16
|
||
warning$ -- 15
|
||
while$ -- 23
|
||
width$ -- 18
|
||
write$ -- 170
|
||
(There were 2 error messages)
|