242 lines
9.2 KiB
Plaintext
242 lines
9.2 KiB
Plaintext
\begin{thebibliography}{10}
|
||
|
||
\bibitem{Arun_Arashloo_Saeed_Alizadeh_Balakrishnan_2021}
|
||
Venkat Arun, Mina~Tahmasbi Arashloo, Ahmed Saeed, Mohammad Alizadeh, and Hari
|
||
Balakrishnan.
|
||
\newblock Toward formally verifying congestion control behavior.
|
||
\newblock In {\em Proceedings of the 2021 ACM SIGCOMM 2021 Conference}, page
|
||
1–16, Virtual Event USA, August 2021. ACM.
|
||
|
||
\bibitem{ParnoSOK}
|
||
Manuel Barbosa, Gilles Barthe, Karthik Bhargavan, Bruno Blanchet, Cas Cremers,
|
||
Kevin Liao, and Bryan Parno.
|
||
\newblock Sok: Computer-aided cryptography.
|
||
\newblock In {\em 2021 IEEE Symposium on Security and Privacy (SP)}, page
|
||
777–795, May 2021.
|
||
|
||
\bibitem{Tamarin}
|
||
David Basin, Cas Cremers, Jannik Dreier, and Ralf Sasse.
|
||
\newblock Tamarin: Verification of large-scale, real-world, cryptographic
|
||
protocols.
|
||
\newblock {\em IEEE Security \& Privacy}, 20(3):24–32, May 2022.
|
||
|
||
\bibitem{Basin_Cremers_Meadows_2018}
|
||
David Basin, Cas Cremers, and Catherine Meadows.
|
||
\newblock {\em Model Checking Security Protocols}, page 727–762.
|
||
\newblock Springer International Publishing, Cham, 2018.
|
||
|
||
\bibitem{Henda}
|
||
Noomene Ben~Henda.
|
||
\newblock Generic and efficient attacker models in spin.
|
||
\newblock In {\em Proceedings of the 2014 International SPIN Symposium on Model
|
||
Checking of Software}, page 77–86, San Jose CA USA, July 2014. ACM.
|
||
|
||
\bibitem{Beurdouche}
|
||
Benjamin Beurdouche.
|
||
\newblock Formal verification for high assurance security software in fstar.
|
||
|
||
\bibitem{Blanchet_Jacomme}
|
||
Bruno Blanchet and Charlie Jacomme.
|
||
\newblock Cryptoverif: a computationally-sound security protocol verifier.
|
||
|
||
\bibitem{Proverif}
|
||
Bruno Blanchet, Ben Smyth, Vincent Cheval, and Marc Sylvestre.
|
||
\newblock Proverif 2.05: Automatic cryptographic protocol verifier, user manual
|
||
and tutorial.
|
||
|
||
\bibitem{mCRL2}
|
||
Olav Bunte, Jan~Friso Groote, Jeroen J.~A. Keiren, Maurice Laveaux, Thomas
|
||
Neele, Erik~P. De~Vink, Wieger Wesselink, Anton Wijs, and Tim A.~C. Willemse.
|
||
\newblock {\em The mCRL2 Toolset for Analysing Concurrent Systems: Improvements
|
||
in Expressivity and Usability}, volume 11428 of {\em Lecture Notes in
|
||
Computer Science}, page 21–39.
|
||
\newblock Springer International Publishing, Cham, 2019.
|
||
|
||
\bibitem{Castro_Liskov_2002}
|
||
Miguel Castro and Barbara Liskov.
|
||
\newblock Practical byzantine fault tolerance and proactive recovery.
|
||
\newblock {\em ACM Transactions on Computer Systems}, 20(4):398–461, November
|
||
2002.
|
||
|
||
\bibitem{Clarke_Wang}
|
||
Edmund~M Clarke and Qinsi Wang.
|
||
\newblock 25 years of model checking.
|
||
|
||
\bibitem{Cluzel_Georgiou_Moy_Zeller_2021}
|
||
Guillaume Cluzel, Kyriakos Georgiou, Yannick Moy, and Clément Zeller.
|
||
\newblock Layered formal verification of a tcp stack.
|
||
\newblock In {\em 2021 IEEE Secure Development Conference (SecDev)}, page
|
||
86–93, Atlanta, GA, USA, October 2021. IEEE.
|
||
|
||
\bibitem{Cremers}
|
||
Cas J.~F. Cremers.
|
||
\newblock {\em The Scyther Tool: Verification, Falsification, and Analysis of
|
||
Security Protocols}, volume 5123 of {\em Lecture Notes in Computer Science},
|
||
page 414–418.
|
||
\newblock Springer Berlin Heidelberg, Berlin, Heidelberg, 2008.
|
||
|
||
\bibitem{Delzanno_Tatarek_Traverso_2014}
|
||
Giorgio Delzanno, Michele Tatarek, and Riccardo Traverso.
|
||
\newblock Model checking paxos in spin.
|
||
\newblock {\em Electronic Proceedings in Theoretical Computer Science},
|
||
161:131–146, August 2014.
|
||
|
||
\bibitem{Ginesin2024}
|
||
Jacob Ginesin, Max von Hippel, Evan Defloor, Cristina Nita-Rotaru, and Michael
|
||
Tüxen.
|
||
\newblock A formal analysis of sctp: Attack synthesis and patch verification.
|
||
\newblock (arXiv:2403.05663), March 2024.
|
||
\newblock arXiv:2403.05663 [cs].
|
||
|
||
\bibitem{Ginesin}
|
||
Jacob Ginesin, Max von Hippel, Evan Defloor, Cristina Nita-Rotaru, and Michael
|
||
Tüxen.
|
||
\newblock A formal analysis of sctp: Attack synthesis and patch verification.
|
||
\newblock (arXiv:2403.05663), March 2024.
|
||
\newblock arXiv:2403.05663 [cs].
|
||
|
||
\bibitem{ironfleet}
|
||
Chris Hawblitzel, Jon Howell, Manos Kapritsos, Jacob~R. Lorch, Bryan Parno,
|
||
Michael~L. Roberts, Srinath Setty, and Brian Zill.
|
||
\newblock Ironfleet: proving practical distributed systems correct.
|
||
\newblock In {\em Proceedings of the 25th Symposium on Operating Systems
|
||
Principles}, page 1–17, Monterey California, October 2015. ACM.
|
||
|
||
\bibitem{Holzmann_2014}
|
||
Gerard~J. Holzmann.
|
||
\newblock Mars code.
|
||
\newblock {\em Communications of the ACM}, 57(2):64–73, February 2014.
|
||
|
||
\bibitem{Holzmann_Smith_2000}
|
||
Gerard~J. Holzmann and Margaret~H. Smith.
|
||
\newblock Automating software feature verification.
|
||
\newblock {\em Bell Labs Technical Journal}, 5(2):72–87, 2000.
|
||
|
||
\bibitem{Holzmann_1997}
|
||
G.J. Holzmann.
|
||
\newblock The model checker spin.
|
||
\newblock {\em IEEE Transactions on Software Engineering}, 23(5):279–295, May
|
||
1997.
|
||
|
||
\bibitem{Hsieh_Mitra_2019}
|
||
Chiao Hsieh and Sayan Mitra.
|
||
\newblock {\em Dione: A Protocol Verification System Built with Dafny for I/O
|
||
Automata}, volume 11918 of {\em Lecture Notes in Computer Science}, page
|
||
227–245.
|
||
\newblock Springer International Publishing, Cham, 2019.
|
||
|
||
\bibitem{TCPwn}
|
||
Samuel Jero, Endadul Hoque, David Choffnes, Alan Mislove, and Cristina
|
||
Nita-Rotaru.
|
||
\newblock Automated attack discovery in tcp congestion control using a
|
||
model-guided approach.
|
||
\newblock In {\em Proceedings 2018 Network and Distributed System Security
|
||
Symposium}, San Diego, CA, 2018. Internet Society.
|
||
|
||
\bibitem{Khan_Mukund_Suresh_2005}
|
||
Abdul~Sahid Khan, Madhavan Mukund, and S.~P. Suresh.
|
||
\newblock {\em Generic Verification of Security Protocols}, volume 3639 of {\em
|
||
Lecture Notes in Computer Science}, page 221–235.
|
||
\newblock Springer Berlin Heidelberg, Berlin, Heidelberg, 2005.
|
||
|
||
\bibitem{Kobeissi_Nicolas_Tiwari}
|
||
Nadim Kobeissi, Georgio Nicolas, and Mukesh Tiwari.
|
||
\newblock Verifpal: Cryptographic protocol analysis for the real world.
|
||
|
||
\bibitem{Kozen_1977}
|
||
Dexter Kozen.
|
||
\newblock Lower bounds for natural proof systems.
|
||
\newblock In {\em 18th Annual Symposium on Foundations of Computer Science
|
||
(sfcs 1977)}, page 254–266, Providence, RI, USA, September 1977. IEEE.
|
||
|
||
\bibitem{Narayana_Chen_Zhao_Chen_Fu_Zhou_2006}
|
||
Prasad Narayana, Ruiming Chen, Yao Zhao, Yan Chen, Zhi Fu, and Hai Zhou.
|
||
\newblock Automatic vulnerability checking of ieee 802.16 wimax protocols
|
||
through tla+.
|
||
\newblock In {\em 2006 2nd IEEE Workshop on Secure Network Protocols}, page
|
||
44–49, November 2006.
|
||
|
||
\bibitem{Ongaro}
|
||
Diego Ongaro.
|
||
\newblock Consensus: Bridging theory and practice.
|
||
|
||
\bibitem{Ongaro_Ousterhout}
|
||
Diego Ongaro and John Ousterhout.
|
||
\newblock In search of an understandable consensus algorithm.
|
||
|
||
\bibitem{Pacheco2022}
|
||
Maria~Leonor Pacheco, Max~Von Hippel, Ben Weintraub, Dan Goldwasser, and
|
||
Cristina Nita-Rotaru.
|
||
\newblock Automated attack synthesis by extracting finite state machines from
|
||
protocol specification documents.
|
||
\newblock In {\em 2022 IEEE Symposium on Security and Privacy (SP)}, page
|
||
51–68, San Francisco, CA, USA, May 2022. IEEE.
|
||
|
||
\bibitem{Pereira}
|
||
Vitor Pereira.
|
||
\newblock Easycrypt - a (brief) tutorial.
|
||
|
||
\bibitem{Rahli_Vukotic_Völp_Esteves-Verissimo_2018}
|
||
Vincent Rahli, Ivana Vukotic, Marcus Völp, and Paulo Esteves-Verissimo.
|
||
\newblock {\em Velisarios: Byzantine Fault-Tolerant Protocols Powered by Coq},
|
||
volume 10801 of {\em Lecture Notes in Computer Science}, page 619–650.
|
||
\newblock Springer International Publishing, Cham, 2018.
|
||
|
||
\bibitem{Sergey_Wilcox_Tatlock_2018}
|
||
Ilya Sergey, James~R. Wilcox, and Zachary Tatlock.
|
||
\newblock Programming and proving with distributed protocols.
|
||
\newblock {\em Proceedings of the ACM on Programming Languages},
|
||
2(POPL):1–30, January 2018.
|
||
|
||
\bibitem{Smith_1997}
|
||
Mark Anthony~Shawn Smith.
|
||
\newblock {\em Formal verification of TCP and T/TCP}.
|
||
\newblock Thesis, Massachusetts Institute of Technology, 1997.
|
||
\newblock Accepted: 2008-09-03T18:09:43Z.
|
||
|
||
\bibitem{rfc9260}
|
||
M.~Tüxen, R.~Stewart, K.~Nielsen, R.~Jesup, and S.~Loreto.
|
||
\newblock {Stream Control Transmission Protocol (SCTP) Specification Errata and
|
||
Issues}.
|
||
\newblock Request for Comments, June 2022.
|
||
|
||
\bibitem{mcp}
|
||
W.~Visser, K.~Havelund, G.~Brat, and Seungjoon Park.
|
||
\newblock Model checking programs.
|
||
\newblock In {\em Proceedings ASE 2000. Fifteenth IEEE International Conference
|
||
on Automated Software Engineering}, page 3–11, Grenoble, France, 2000.
|
||
IEEE.
|
||
|
||
\bibitem{Hippel2022}
|
||
Max von Hippel, Cole Vick, Stavros Tripakis, and Cristina Nita-Rotaru.
|
||
\newblock Automated attacker synthesis for distributed protocols.
|
||
\newblock (arXiv:2004.01220), April 2022.
|
||
\newblock arXiv:2004.01220 [cs].
|
||
|
||
\bibitem{message_queues_TLA}
|
||
Hillel Wayne.
|
||
\newblock Tla+ message passing, October 2018.
|
||
|
||
\bibitem{wayne_adversaries}
|
||
Hillel Wayne.
|
||
\newblock Modeling adversaries with tla+.
|
||
\newblock \url{https://www.hillelwayne.com/post/adversaries/}, 2019.
|
||
\newblock Accessed: 2024-12-03.
|
||
|
||
\bibitem{Wilcox_Woos_Panchekha_Tatlock_Wang_Ernst_Anderson}
|
||
James~R Wilcox, Doug Woos, Pavel Panchekha, Zachary Tatlock, Xi~Wang, Michael~D
|
||
Ernst, and Thomas Anderson.
|
||
\newblock Verdi: A framework for implementing and formally verifying
|
||
distributed systems.
|
||
|
||
\bibitem{Woos_Wilcox_Anton_Tatlock_Ernst_Anderson_2016}
|
||
Doug Woos, James~R. Wilcox, Steve Anton, Zachary Tatlock, Michael~D. Ernst, and
|
||
Thomas Anderson.
|
||
\newblock Planning for change in a formal verification of the raft consensus
|
||
protocol.
|
||
\newblock In {\em Proceedings of the 5th ACM SIGPLAN Conference on Certified
|
||
Programs and Proofs}, page 154–165, St. Petersburg FL USA, January 2016.
|
||
ACM.
|
||
|
||
\end{thebibliography}
|