[1] |
FITER?U-BRO?TEAN P , . Model learning and model checking of SSH implementations[C]// Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software. 2017.
|
[2] |
ANGLUIN D . Learning regular sets from queries and counterexamples[J]. Information and Computation, 1987,75(2): 87-106.
|
[3] |
GUO J , GU C , CHEN X ,et al. Model learning and model checking of IPSec implementations for internet of things[J]. IEEE Access, 2019,7: 171322-171332.
|
[4] |
FITERAU-BROSTEAN P , JONSSON B , MERGET R ,et al. Analysis of DTLS implementations using protocol state fuzzing[C]// 29th {USENIX} Security Symposium ({USENIX} Security 20). 2020: 2523-2540.
|
[5] |
CHAU S Y , CHOWDHURY O , HOQUE E ,et al. Symcerts:practical symbolic execution for exposing noncompliance in X.509 certificate validation implementations[C]// 2017 IEEE Symposium on Security and Privacy (SP). 2017: 503-520.
|
[6] |
CORIN R , MANZANO F A . Efficient symbolic execution for analysing cryptographic protocol implementations[C]// International Symposium on Engineering Secure Software and Systems. 2011: 58-72.
|
[7] |
VANHOEF M , PIESSENS F . Symbolic execution of security protocol implementations:handling cryptographic primitives[C]// 12th{USENIX} Workshop on Offensive Technologies ({WOOT} 18). 2018.
|
[8] |
CHAU S Y , YAHYAZADEH M , CHOWDHURY O ,et al. Analyzing semantic correctness with symbolic execution:a case study on pkcs# 1 v1.5 signature verification[C]// Network and Distributed Systems Security (NDSS) Symposium 2019. 2019.
|
[9] |
孟博, 鲁金钿, 王德军 ,等. 安全协议实施安全性分析综述[J]. 山东大学学报:理学版, 2018,53(1): 1-18.
|
|
MENG B , LU J T , WANG D J ,et al. Survey of security analysis of security protocol implementations[J]. Journal of Shandong University (Natural Science), 2018,53(1): 1-18.
|
[10] |
AICHERNIG B K , MOSTOWSKI W , MOUSAVI M R ,et al. Model learning and model-based testing[M]. Machine Learning for Dynamic Software Analysis: Potentials and Limits. 2018: 74-100.
|
[11] |
JERO S , HOQUE M E , CHOFFNES D R ,et al. Automated attack discovery in TCP congestion control using a model-guided approach[C]// NDSS. 2018.
|
[12] |
JERO S , LEE H , NITA-ROTARU C , . Leveraging state information for automated attack discovery in transport protocol implementations[C]// 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. 2015: 1-12.
|
[13] |
WALLS R J , BRUN Y , LIBERATORE M ,et al. Discovering specification violations in networked software systems[C]// 2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE). 2015: 496-506.
|
[14] |
SONG J S , CADAR C , PIETZUCH P . SymbexNet:testing network protocol implementations with symbolic execution and rule-based specifications[J]. IEEE Transactions on Software Engineering, 2014,40(7): 695-709.
|
[15] |
ALSHMRANY K , CORDEIRO L . Finding security vulnerabilities in network protocol implementations[J]. arXiv preprint arXiv:2001.09592, 2020.
|
[16] |
谢肖飞, 李晓红, 陈翔 ,等. 基于符号执行与模糊测试的混合测试方法[J]. 软件学报, 2019,30(10): 3071-3089.
|
|
XIE X F , LI X H , CHEN X ,et al. Hybrid testing based on symbolic execution and fuzzing[J]. Journal of Software, 2019,30(10): 3071-3089.
|
[17] |
CHO C Y , BABIC D , POOSANKAM P ,et al. MACE:model-inference-assisted concolic exploration for protocol and vulnerability discovery[C]// USENIX Security Symposium. 2011:139.
|
[18] |
YLONEN T , LONVICK C . The secure shell (SSH) protocol architecture[S]. RFC4251,Internet Engineering Task Force, 2006.
|