메뉴 건너뛰기




Volumn 6542 LNCS, Issue , 2011, Pages 58-72

Efficient symbolic execution for analysing cryptographic protocol implementations

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC PRIMITIVES; CRYPTOGRAPHIC PROTOCOLS; REWRITING RULES; SYMBOLIC ANALYSIS; SYMBOLIC EXECUTION; SYMBOLIC FUNCTIONS; SYMBOLIC SEMANTICS; VIRTUAL MACHINES; CONCURRENT CRYPTOGRAPHIC PROTOCOLS; LOW LEVEL VIRTUAL MACHINES;

EID: 79551546339     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-19125-1_5     Document Type: Conference Paper
Times cited : (16)

References (18)
  • 3
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • IEEE Computer Society, Los Alamitos
    • Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: CSFW, pp. 82-96. IEEE Computer Society, Los Alamitos (2001)
    • (2001) CSFW , pp. 82-96
    • Blanchet, B.1
  • 4
    • 55949087657 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • Blanchet, B.: A computationally sound mechanized prover for security protocols. IEEE Trans. Dependable Sec. Comput. 5(4), 193-207 (2008)
    • (2008) IEEE Trans. Dependable Sec. Comput. , vol.5 , Issue.4 , pp. 193-207
    • Blanchet, B.1
  • 5
    • 85076893888 scopus 로고    scopus 로고
    • Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs
    • Cadar, C., Dunbar, D., Engler: D.r.: Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. In: Proceedings of OSDI, pp. 209-224 (2008)
    • (2008) Proceedings of OSDI , pp. 209-224
    • Cadar, C.1    Dunbar, D.2    Engler, D.R.3
  • 7
    • 77953882941 scopus 로고    scopus 로고
    • The Transport Layer Security (tls) protocol
    • Internet Engineering Task Force April
    • Dierks, T., Rescorla, E.: The Transport Layer Security (tls) protocol. RFC 4346, Internet Engineering Task Force (April 2006), http://www.ietf.org/rfc/ rfc4346. txt
    • (2006) RFC , vol.4346
    • Dierks, T.1    Rescorla, E.2
  • 11
    • 34547455692 scopus 로고    scopus 로고
    • Security analysis of crypto-based java programs using automated theorem provers
    • IEEE Computer Society, Los Alamitos
    • Jürjens, J.: Security analysis of crypto-based java programs using automated theorem provers. In: ASE, pp. 167-176. IEEE Computer Society, Los Alamitos (2006)
    • (2006) ASE , pp. 167-176
    • Jürjens, J.1
  • 12
    • 0016971687 scopus 로고
    • Symbolic execution and program testing
    • King, J.C.: Symbolic execution and program testing. ACM Commun. 19(7), 385-394 (1976)
    • (1976) ACM Commun. , vol.19 , Issue.7 , pp. 385-394
    • King, J.C.1
  • 16
    • 77949431518 scopus 로고    scopus 로고
    • Formally-based black-box monitoring of security protocols
    • Massacci, F., Wallach, D.S., Zannone, N. (eds.) ESSoS 2010. Springer, Heidelberg
    • Pironti, A., Jürjens, J.: Formally-based black-box monitoring of security protocols. In: Massacci, F., Wallach, D.S., Zannone, N. (eds.) ESSoS 2010. LNCS, vol. 5965, pp. 79-95. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5965 , pp. 79-95
    • Pironti, A.1    Jürjens, J.2
  • 17
    • 58449129985 scopus 로고    scopus 로고
    • BitBlaze: A new approach to computer security via binary analysis
    • Sekar, R., Pujari, A.K. (eds.) ICISS 2008. Springer, Heidelberg
    • Song, D., Brumley, D., Yin, H., Caballero, J., Jager, I., Kang, M.G., Liang, Z., Newsome, J., Poosankam, P., Saxena, P.: BitBlaze: A new approach to computer security via binary analysis. In: Sekar, R., Pujari, A.K. (eds.) ICISS 2008. LNCS, vol. 5352, pp. 1-25. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5352 , pp. 1-25
    • Song, D.1    Brumley, D.2    Yin, H.3    Caballero, J.4    Jager, I.5    Kang, M.G.6    Liang, Z.7    Newsome, J.8    Poosankam, P.9    Saxena, P.10


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.