메뉴 건너뛰기




Volumn , Issue , 2008, Pages 31-36

Can You Fool Me? Towards Automatically Checking Protocol Gullibility

Author keywords

[No Author keywords available]

Indexed keywords


EID: 80053168763     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (9)

References (22)
  • 8
    • 57349133785 scopus 로고    scopus 로고
    • Grammar-based whitebox fuzzing
    • P. Godefroid, A. Kiezun, and M. Y. Levin. Grammar-based whitebox fuzzing. In PLDI, pages 206-215, 2008.
    • (2008) PLDI , pp. 206-215
    • Godefroid, P.1    Kiezun, A.2    Levin, M.Y.3
  • 10
  • 11
    • 85028155431 scopus 로고    scopus 로고
    • Life, death, and the critical transition: Finding liveness bugs in system code
    • Apr
    • C. Killian, J. W. Anderson, R. Jhala, and A. Vahdat. Life, death, and the critical transition: Finding liveness bugs in system code. In NSDI, Apr. 2007.
    • (2007) NSDI
    • Killian, C.1    Anderson, J.W.2    Jhala, R.3    Vahdat, A.4
  • 12
    • 0016971687 scopus 로고
    • Symbolic execution and program testing
    • J. C. King. Symbolic execution and program testing. Commun. ACM, 19(7), 1976.
    • (1976) Commun. ACM , vol.19 , Issue.7
    • King, J.C.1
  • 13
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Springer-Verlag, Berlin Germany
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 1055, pages 147-166. Springer-Verlag, Berlin Germany, 1996.
    • (1996) Tools and Algorithms for the Construction and Analysis of Systems (TACAS) , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 14
    • 85134062267 scopus 로고    scopus 로고
    • Encouraging cooperation in multi-hop wireless networks
    • May
    • R. Mahajan, M. Rodrig, D. Wetherall, and J. Zahorjan. Encouraging cooperation in multi-hop wireless networks. In NSDI, May 2005.
    • (2005) NSDI
    • Mahajan, R.1    Rodrig, M.2    Wetherall, D.3    Zahorjan, J.4
  • 15
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • C. Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 16
    • 0025557712 scopus 로고
    • An empirical study of the reliability of unix utilities
    • B. P. Miller, L. Fredriksen, and B. So. An empirical study of the reliability of unix utilities. Commun. ACM, 33(12):32-44, 1990.
    • (1990) Commun. ACM , vol.33 , Issue.12 , pp. 32-44
    • Miller, B.P.1    Fredriksen, L.2    So, B.3
  • 17
    • 11244321232 scopus 로고    scopus 로고
    • CMC: A pragmatic approach to model checking real code
    • Dec
    • M. Musuvathi, D. Park, A. Chou, D. Engler, and D. Dill. CMC: A pragmatic approach to model checking real code. In OSDI, Dec. 2002.
    • (2002) OSDI
    • Musuvathi, M.1    Park, D.2    Chou, A.3    Engler, D.4    Dill, D.5
  • 20
    • 0031627781 scopus 로고    scopus 로고
    • Efficient finite-state analysis for large security protocols
    • V. Shmatikov and U. Stern. Efficient finite-state analysis for large security protocols. In CSFW, pages 106-115, 1998.
    • (1998) CSFW , pp. 106-115
    • Shmatikov, V.1    Stern, U.2
  • 22
    • 84885668018 scopus 로고    scopus 로고
    • Using model checking to find serious file system errors
    • J. Yang, P. Twohey, D. R. Engler, and M. Musuvathi. Using model checking to find serious file system errors. In OSDI, pages 273-288, 2004.
    • (2004) OSDI , pp. 273-288
    • Yang, J.1    Twohey, P.2    Engler, D.R.3    Musuvathi, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.