-
1
-
-
0035475290
-
-
M. Bond, R. Anderson, API level attacks on embedded systems, IEEE Comput. Mag. (2001) 67-75.
-
-
-
-
2
-
-
33750440662
-
-
M. Bond, P. Zieliński, Decimalisation table attacks for PIN cracking, Technical Report UCAM-CL-TR-560, University of Cambridge, January 2003.
-
-
-
-
3
-
-
84923057783
-
-
M. Carlsson, G. Ottosson, B. Carlson, An open-ended finite domain constraint solver, in: Proc. Programming Languages: Implementations, Logics, and Programs, Southampton, UK, September 1997, pp. 191-206.
-
-
-
-
4
-
-
33750493170
-
-
J. Clulow, The design and analysis of cryptographic APIs for security devices, Master's Thesis, University of Natal, Durban, 2003.
-
-
-
-
5
-
-
26844469379
-
-
P. Drielsma, S. Mödersheim, L. Viganò, A formalization of off-line guessing for security protocol analysis, in: F. Baader, A. Voronkov (Eds.), LPAR, Lecture Notes in Artificial Intelligence, Vol. 3452, ETH Zürich, Computer Science, Springer, Berlin, 2005, pp. 363-379.
-
-
-
-
6
-
-
26944470937
-
Automatic discovery of API-level exploits
-
ACM Press, New York, NY, USA
-
Ganapathy V., Seshia S.A., Jha S., Reps T.W., and Bryant R.E. Automatic discovery of API-level exploits. ICSE '05: Proc. 27th Internat. Conf. on Software Engineering (May 2005), ACM Press, New York, NY, USA 312-321
-
(2005)
ICSE '05: Proc. 27th Internat. Conf. on Software Engineering
, pp. 312-321
-
-
Ganapathy, V.1
Seshia, S.A.2
Jha, S.3
Reps, T.W.4
Bryant, R.E.5
-
7
-
-
0003096318
-
A logic for reasoning about time and reliability
-
Hansson H., and Jonsson B. A logic for reasoning about time and reliability. Formal Aspects Comput. 6 5 (1994) 512-535
-
(1994)
Formal Aspects Comput.
, vol.6
, Issue.5
, pp. 512-535
-
-
Hansson, H.1
Jonsson, B.2
-
8
-
-
16244397718
-
PRISM 20: a tool for probabilistic model checking
-
IEEE Computer Society Press, Silver Spring, MD
-
Kwiatkowska M., Norman G., and Parker D. PRISM 20: a tool for probabilistic model checking. Proc. First Internat. Conf. on Quantitative Evaluation of Systems (QEST'04) (2004), IEEE Computer Society Press, Silver Spring, MD 322-323
-
(2004)
Proc. First Internat. Conf. on Quantitative Evaluation of Systems (QEST'04)
, pp. 322-323
-
-
Kwiatkowska, M.1
Norman, G.2
Parker, D.3
-
9
-
-
0026837069
-
An automatic search for security flaws in key management schemes
-
Longley D., and Rigby S. An automatic search for security flaws in key management schemes. Comput. Security 11 1 (1992) 75-89
-
(1992)
Comput. Security
, vol.11
, Issue.1
, pp. 75-89
-
-
Longley, D.1
Rigby, S.2
-
10
-
-
0344875574
-
Analysing protocol subject to guessing attacks
-
Lowe G. Analysing protocol subject to guessing attacks. J. Comput. Security 12 1 (2004) 83-98
-
(2004)
J. Comput. Security
, vol.12
, Issue.1
, pp. 83-98
-
-
Lowe, G.1
-
11
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
Berkeley, California
-
Sheyner O., Haines J., Jha S., Lippmann R., and Wing J.M. Automated generation and analysis of attack graphs. 2002 IEEE Symp. on Security and Privacy. Berkeley, California (May 12-15, 2002) 273-284
-
(2002)
2002 IEEE Symp. on Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
12
-
-
84948775332
-
-
V. Shmatikov, Probabilistic analysis of anonymity, in: CSFW '02: Proc. 15th IEEE Computer Security Foundations Workshop (CSFW'02), Washington, DC, USA, 2002, IEEE Computer Society, pp. 119-128.
-
-
-
-
13
-
-
26944468299
-
-
G. Steel, Deduction with XOR constraints in security API modelling, in: R. Nieuwenhuis (Ed.), Proc. 20th Conf. on Automated Deduction (CADE 20), Tallinn, Estonia, July 2005, Lecture Notes in Artificial Intelligence, Vol. 3632, Springer, Heidelberg, pp. 322-336.
-
-
-
-
14
-
-
33750445829
-
-
P. Youn, B. Adida, M. Bond, J. Clulow, J. Herzog, A. Lin, R. Rivest, R. Anderson, Robbing the bank with a theorem prover, Technical Report UCAM-CL-TR-644, University of Cambridge, August 2005.
-
-
-
|