Tracing Protocols (original) (raw)
Related papers
On limits and possibilities of automated protocol analysis
2006
Algorithms for automated protocol validation
1990
Verification of protocols using symbolic execution
Computer Networks (1976), 1978
A scalable tool for efficient protocol validation and testing
Computer Communications, 2003
Rule-based Verification of Network Protocol Implementations using Symbolic Execution
2011
Recovery of communications protocol design from protocol execution traces
1996
A Theory for Protocol Validation
IEEE Transactions on Computers, 2000
Towards analyzing and synthesizing protocols
… IEEE Transactions on, 1980
A generic application-level protocol analyzer and its language
2007
On the Automated Correction of Protocols with Improper Message Encoding
Lecture Notes in Computer Science, 2009
On the Automated Correction of Faulty Security Protocols
Citeseer
Automatic validation of protocol narration
16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 2003
A Pre-Injection Analysis for Identifying Fault-Injection Tests for Protocol Validation
2010
An improved protocol reachability analysis technique
Software: Practice and Experience, 1988
Backward symbolic execution of protocols
1985
Introducing ASPECT 1 - a tool for checking protocol security
2002
Reverse Engineering of Protocols from Network Traces
homepages.di.fc.ul.pt
Automatically complementing protocol specifications from network traces
Proceedings of the 13th European Workshop on …, 2011
The BNAI Analyzer: A Tool for Verifying Admissible Information Flow in Protocols
Automated Protocol Validation in Argos: Assertion Proving and Scatter Searching
IEEE Transactions on Software Engineering, 2000
On the Automated Correction of Security Protocols Susceptible to a Replay Attack
European Symposium on Research in Computer Security, 2007
ACM SIGCOMM Computer Communication Review, 2005
Protocol validation for large-scale applications
IEEE Software, 2000
An On-the-Fly Model-Checker for Security Protocol Analysis
Lecture Notes in Computer Science, 2003
Protocol Conformance Testing — A Survey
Computer Networks, Architecture and Applications, 1995
Tools for cryptographic protocols analysis: A technical and experimental comparison
Computer Standards & Interfaces, 2009
ReverX: Reverse engineering of protocols
2011
A Methodology for Protocol Verification
2018