-
1
-
-
79551535385
-
-
Aizatulin, M., Gordon, A., Jurgens, J., Nuseibeh, B.: Verifying implementations of security protocols in c, http://users.mct.open.ac.uk/ma4962/ files/ abstract202010.pdf
-
Verifying Implementations of Security Protocols in C
-
-
Aizatulin, M.1
Gordon, A.2
Jurgens, J.3
Nuseibeh, B.4
-
2
-
-
57849106656
-
Cryptographically verified implementations for tls
-
Ning, P., Syverson, P.F., Jha, S. (eds.) ACM, New York
-
Bhargavan, K., Fournet, C., Corin, R., Zalinescu, E.: Cryptographically verified implementations for tls. In: Ning, P., Syverson, P.F., Jha, S. (eds.) ACM Conference on Computer and Communications Security, pp. 459-468. ACM, New York (2008)
-
(2008)
ACM Conference on Computer and Communications Security
, pp. 459-468
-
-
Bhargavan, K.1
Fournet, C.2
Corin, R.3
Zalinescu, E.4
-
3
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
IEEE Computer Society, Los Alamitos
-
Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: CSFW, pp. 82-96. IEEE Computer Society, Los Alamitos (2001)
-
(2001)
CSFW
, pp. 82-96
-
-
Blanchet, B.1
-
4
-
-
55949087657
-
A computationally sound mechanized prover for security protocols
-
Blanchet, B.: A computationally sound mechanized prover for security protocols. IEEE Trans. Dependable Sec. Comput. 5(4), 193-207 (2008)
-
(2008)
IEEE Trans. Dependable Sec. Comput.
, vol.5
, Issue.4
, pp. 193-207
-
-
Blanchet, B.1
-
5
-
-
85076893888
-
Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs
-
Cadar, C., Dunbar, D., Engler: D.r.: Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. In: Proceedings of OSDI, pp. 209-224 (2008)
-
(2008)
Proceedings of OSDI
, pp. 209-224
-
-
Cadar, C.1
Dunbar, D.2
Engler, D.R.3
-
7
-
-
77953882941
-
The Transport Layer Security (tls) protocol
-
Internet Engineering Task Force April
-
Dierks, T., Rescorla, E.: The Transport Layer Security (tls) protocol. RFC 4346, Internet Engineering Task Force (April 2006), http://www.ietf.org/rfc/ rfc4346. txt
-
(2006)
RFC
, vol.4346
-
-
Dierks, T.1
Rescorla, E.2
-
11
-
-
34547455692
-
Security analysis of crypto-based java programs using automated theorem provers
-
IEEE Computer Society, Los Alamitos
-
Jürjens, J.: Security analysis of crypto-based java programs using automated theorem provers. In: ASE, pp. 167-176. IEEE Computer Society, Los Alamitos (2006)
-
(2006)
ASE
, pp. 167-176
-
-
Jürjens, J.1
-
12
-
-
0016971687
-
Symbolic execution and program testing
-
King, J.C.: Symbolic execution and program testing. ACM Commun. 19(7), 385-394 (1976)
-
(1976)
ACM Commun.
, vol.19
, Issue.7
, pp. 385-394
-
-
King, J.C.1
-
16
-
-
77949431518
-
Formally-based black-box monitoring of security protocols
-
Massacci, F., Wallach, D.S., Zannone, N. (eds.) ESSoS 2010. Springer, Heidelberg
-
Pironti, A., Jürjens, J.: Formally-based black-box monitoring of security protocols. In: Massacci, F., Wallach, D.S., Zannone, N. (eds.) ESSoS 2010. LNCS, vol. 5965, pp. 79-95. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5965
, pp. 79-95
-
-
Pironti, A.1
Jürjens, J.2
-
17
-
-
58449129985
-
BitBlaze: A new approach to computer security via binary analysis
-
Sekar, R., Pujari, A.K. (eds.) ICISS 2008. Springer, Heidelberg
-
Song, D., Brumley, D., Yin, H., Caballero, J., Jager, I., Kang, M.G., Liang, Z., Newsome, J., Poosankam, P., Saxena, P.: BitBlaze: A new approach to computer security via binary analysis. In: Sekar, R., Pujari, A.K. (eds.) ICISS 2008. LNCS, vol. 5352, pp. 1-25. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5352
, pp. 1-25
-
-
Song, D.1
Brumley, D.2
Yin, H.3
Caballero, J.4
Jager, I.5
Kang, M.G.6
Liang, Z.7
Newsome, J.8
Poosankam, P.9
Saxena, P.10
|