Tracing Protocols (original) (raw)

On limits and possibilities of automated protocol analysis

Gerard Holzmann

2006

View PDFchevron_right

Algorithms for automated protocol validation

Gerard Holzmann

1990

View PDFchevron_right

Verification of protocols using symbolic execution

Daniel Brand

Computer Networks (1976), 1978

View PDFchevron_right

A scalable tool for efficient protocol validation and testing

Jenny Li

Computer Communications, 2003

View PDFchevron_right

Rule-based Verification of Network Protocol Implementations using Symbolic Execution

Peter Pietzuch

2011

View PDFchevron_right

Recovery of communications protocol design from protocol execution traces

kassem afif saleh

1996

View PDFchevron_right

A Theory for Protocol Validation

Gerard Holzmann

IEEE Transactions on Computers, 2000

View PDFchevron_right

Towards analyzing and synthesizing protocols

Daniel Brand

… IEEE Transactions on, 1980

View PDFchevron_right

A generic application-level protocol analyzer and its language

Chuanxiong Guo

2007

View PDFchevron_right

On the Automated Correction of Protocols with Improper Message Encoding

Raul Monroy

Lecture Notes in Computer Science, 2009

View PDFchevron_right

On the Automated Correction of Faulty Security Protocols

Dieter Hutter, Raul Monroy

Citeseer

View PDFchevron_right

Automatic validation of protocol narration

Pierpaolo Degano

16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 2003

View PDFchevron_right

A Pre-Injection Analysis for Identifying Fault-Injection Tests for Protocol Validation

Neeraj Suri

2010

View PDFchevron_right

An improved protocol reachability analysis technique

Gerard Holzmann

Software: Practice and Experience, 1988

View PDFchevron_right

Backward symbolic execution of protocols

Gerard Holzmann

1985

View PDFchevron_right

Introducing ASPECT 1 - a tool for checking protocol security

Brian Monahan

2002

View PDFchevron_right

Reverse Engineering of Protocols from Network Traces

João Antunes

homepages.di.fc.ul.pt

View PDFchevron_right

Automatically complementing protocol specifications from network traces

João Antunes

Proceedings of the 13th European Workshop on …, 2011

View PDFchevron_right

The BNAI Analyzer: A Tool for Verifying Admissible Information Flow in Protocols

Gaétan Hains

View PDFchevron_right

Automated Protocol Validation in Argos: Assertion Proving and Scatter Searching

Gerard Holzmann

IEEE Transactions on Software Engineering, 2000

View PDFchevron_right

On the Automated Correction of Security Protocols Susceptible to a Replay Attack

Dieter Hutter

European Symposium on Research in Computer Security, 2007

View PDFchevron_right

Rigorous specification and conformance testing techniques for network protocols, as applied to TCP, UDP, and sockets

Michael Churchill-Smith

ACM SIGCOMM Computer Communication Review, 2005

View PDFchevron_right

Protocol validation for large-scale applications

Fuchun Lin

IEEE Software, 2000

View PDFchevron_right

An On-the-Fly Model-Checker for Security Protocol Analysis

Luca Vigan

Lecture Notes in Computer Science, 2003

View PDFchevron_right

Protocol Conformance Testing — A Survey

Professor S V Raghavan

Computer Networks, Architecture and Applications, 1995

View PDFchevron_right

Tools for cryptographic protocols analysis: A technical and experimental comparison

Luca Durante, Riccardo Sisto

Computer Standards & Interfaces, 2009

View PDFchevron_right

ReverX: Reverse engineering of protocols

João Antunes

2011

View PDFchevron_right

A Methodology for Protocol Verification

Leo Freitas

2018

View PDFchevron_right