-
1
-
-
84875509486
-
A classification for model-based security testing
-
M. Felderer, B. Agreiter, P. Zech, and R. Breu, "A classification for model-based security testing, " in Advances in System Testing and Validation Lifecycle (VALID 2011), 2011, pp. 109-114.
-
(2011)
Advances in System Testing and Validation Lifecycle (VALID 2011)
, pp. 109-114
-
-
Felderer, M.1
Agreiter, B.2
Zech, P.3
Breu, R.4
-
2
-
-
0023453626
-
Learning regular sets from queries and counterexamples
-
D. Angluin, "Learning regular sets from queries and counterexamples, " Inf. Comput. , vol. 75, no. 2, pp. 87-106, 1987.
-
(1987)
Inf. Comput.
, vol.75
, Issue.2
, pp. 87-106
-
-
Angluin, D.1
-
4
-
-
70350536587
-
LearnLib: A framework for extrapolating behavioral models
-
H. Raffelt, B. Steffen, T. Berg, and T. Margaria, "LearnLib: a framework for extrapolating behavioral models, " Int. J. Softw. Tools Technol. Transf. , vol. 11, pp. 393-407, 2009.
-
(2009)
Int. J. Softw. Tools Technol. Transf.
, vol.11
, pp. 393-407
-
-
Raffelt, H.1
Steffen, B.2
Berg, T.3
Margaria, T.4
-
5
-
-
78649865496
-
Generating models of infinitestate communication protocols using regular inference with abstraction
-
F. Aarts, B. Jonsson, and J. Uijen, "Generating models of infinitestate communication protocols using regular inference with abstraction, " in Proceedings of the 22nd IFIP WG 6. 1 international conference on Testing software and systems, ser. ICTSS'10, 2010, pp. 188-204.
-
(2010)
Proceedings of the 22nd IFIP WG 6. 1 International Conference on Testing Software and Systems, Ser. ICTSS'10
, pp. 188-204
-
-
Aarts, F.1
Jonsson, B.2
Uijen, J.3
-
6
-
-
78650271044
-
Inference and abstraction of the biometric passport
-
F. Aarts, J. Schmaltz, and F. Vaandrager, "Inference and abstraction of the biometric passport, " in International Symposium on Leveraging applications of formal methods, verification, and validation (ISoLa'10), 2010, pp. 673-686.
-
(2010)
International Symposium on Leveraging Applications of Formal Methods, Verification, and Validation (ISoLa'10)
, pp. 673-686
-
-
Aarts, F.1
Schmaltz, J.2
Vaandrager, F.3
-
9
-
-
70350416988
-
Optimised to fail: Card readers for online banking
-
Springer
-
S. Drimer, S. Murdoch, and R. Anderson, "Optimised to fail: Card readers for online banking, " in Financial Cryptography and Data Security, ser. LNCS, vol. 5628. Springer, 2009, pp. 184-200.
-
(2009)
Financial Cryptography and Data Security, Ser. LNCS
, vol.5628
, pp. 184-200
-
-
Drimer, S.1
Murdoch, S.2
Anderson, R.3
-
11
-
-
0017973244
-
Testing software design modeled by finite-state machines
-
special issue on COMPSAC
-
T. Chow, "Testing software design modeled by finite-state machines, " Software Engineering, IEEE Transactions on, vol. 4, no. 3, pp. 178-187, 1978, special issue on COMPSAC.
-
(1978)
Software Engineering, IEEE Transactions on
, vol.4
, Issue.3
, pp. 178-187
-
-
Chow, T.1
-
13
-
-
33750230605
-
SNOOZE: Toward a stateful network protocol fuzzer
-
G. Banks, M. Cova, V. Felmetsger, K. Almeroth, R. Kemmerer, and G. Vigna, "SNOOZE: toward a stateful network protocol fuzzer, " Information Security, pp. 343-358, 2006.
-
(2006)
Information Security
, pp. 343-358
-
-
Banks, G.1
Cova, M.2
Felmetsger, V.3
Almeroth, K.4
Kemmerer, R.5
Vigna, G.6
-
14
-
-
57049146951
-
Model-based security testing using UMLsec:: A case study
-
J. Jürjens, "Model-based security testing using UMLsec:: A case study, " Electronic Notes in Theoretical Computer Science, vol. 220, no. 1, pp. 93-104, 2008.
-
(2008)
Electronic Notes in Theoretical Computer Science
, vol.220
, Issue.1
, pp. 93-104
-
-
Jürjens, J.1
-
17
-
-
80051626152
-
Security vulnerabilities detection using model inference for applications and security protocols
-
K. Hossen, R. Groz, and J. L. Richier, "Security vulnerabilities detection using model inference for applications and security protocols, " in Software Testing, Verification and Validation Workshops (ICSTW'11). IEEE, 2011, pp. 534-536.
-
(2011)
Software Testing, Verification and Validation Workshops (ICSTW'11). IEEE
, pp. 534-536
-
-
Hossen, K.1
Groz, R.2
Richier, J.L.3
-
19
-
-
67249125809
-
A model-based approach to security flaw detection of network protocol implementations
-
Y. Hsu, G. Shu, and D. Lee, "A model-based approach to security flaw detection of network protocol implementations, " 2008 IEEE International Conference on Network Protocols, vol. 40, no. 2, pp. 114-123, 2008.
-
(2008)
2008 IEEE International Conference on Network Protocols
, vol.40
, Issue.2
, pp. 114-123
-
-
Hsu, Y.1
Shu, G.2
Lee, D.3
-
20
-
-
70350402293
-
Prospex: Protocol specification extraction
-
P. Comparetti, G. Wondracek, C. Kruegel, and E. Kirda, "Prospex: Protocol specification extraction, " in Security and Privacy. IEEE, 2009, pp. 110-125.
-
(2009)
Security and Privacy. IEEE
, pp. 110-125
-
-
Comparetti, P.1
Wondracek, G.2
Kruegel, C.3
Kirda, E.4
|