This deposit provides an Ubuntu Virtual Machine (VM) containing the implementation of the bug detection approach presented in the paper 'Automata-Based Automated Detection of State Machine Bugs in Protocol Implementations', accepted at NDSS 2023. The VM also includes instructions for reproducing bug detection experiments on a number of DTLS and SSH implementations. The VM is provided in an '.ova' file, from which it can be imported using a virtual machine client such as VirtualBox. Username and password are 'user' and 'user', respectively. Instructions on how to run the implementation are available in the 'Artifact' folder for which a shortcut is available on the desktop. Paper Abstract: Implementations of stateful security protocols mus...
The Internet is a technology that was invented in the 1960s and was used only by a few users to do s...
System administrators use application-level knowledge to identify anomalies in virtual appliances (V...
This upload is a virtual machine (VM) containing the artifact accompanying our paper "Randomized Tes...
We describe a largely automated and systematic analysis of TLS implementations by what we call ‘prot...
TLS and SSH are two well-known and thoroughly studied security protocols. In this thesis, we focus o...
Abstract. The security of network services and their protocols critically depends on minimizing thei...
Despite being unreliable, UDP is the prefered choice for a growing number ofimplementations due to i...
Analyzing large cryptographic protocol implementations can be challenging since their implementation...
Recent years have witnessed an increasing number of protocols relying on UDP. Compared to TCP, UDP o...
Coverage-based greybox fuzzing has strong capabilities in discovering virtualization software vulner...
Security bugs in network-based applications allow an attacker to compromise a system from the networ...
International audienceRecently efficient model-checking tools have been developed to find flaws in s...
Cyber attacks against networked computers have become relentless in recent years. The most common at...
International audienceThe maturity of hardware virtualization has motivated Communication Service Pr...
Recently efficient model-checking tools have been developed to find flaws in security protocols spec...
The Internet is a technology that was invented in the 1960s and was used only by a few users to do s...
System administrators use application-level knowledge to identify anomalies in virtual appliances (V...
This upload is a virtual machine (VM) containing the artifact accompanying our paper "Randomized Tes...
We describe a largely automated and systematic analysis of TLS implementations by what we call ‘prot...
TLS and SSH are two well-known and thoroughly studied security protocols. In this thesis, we focus o...
Abstract. The security of network services and their protocols critically depends on minimizing thei...
Despite being unreliable, UDP is the prefered choice for a growing number ofimplementations due to i...
Analyzing large cryptographic protocol implementations can be challenging since their implementation...
Recent years have witnessed an increasing number of protocols relying on UDP. Compared to TCP, UDP o...
Coverage-based greybox fuzzing has strong capabilities in discovering virtualization software vulner...
Security bugs in network-based applications allow an attacker to compromise a system from the networ...
International audienceRecently efficient model-checking tools have been developed to find flaws in s...
Cyber attacks against networked computers have become relentless in recent years. The most common at...
International audienceThe maturity of hardware virtualization has motivated Communication Service Pr...
Recently efficient model-checking tools have been developed to find flaws in security protocols spec...
The Internet is a technology that was invented in the 1960s and was used only by a few users to do s...
System administrators use application-level knowledge to identify anomalies in virtual appliances (V...
This upload is a virtual machine (VM) containing the artifact accompanying our paper "Randomized Tes...