共 27 条
[1]
RESCORLA E., The transport layer security (TLS) protocol version 1. 3
[2]
ALFARDAN N J, PATERSON K G., Lucky thirteen: breaking the TLS and DTLS record protocols, Proc. of the IEEE Symposium on Security and Privacy, pp. 526-540, (2013)
[3]
YAU A K L, PATERSON K G, MITCHELL C J., Padding oracle attacks on CBC-mode encryption with secret and random IVs, Proc. of the International Workshop on Fast Software Encryption, pp. 299-319, (2005)
[4]
MOLLER B, DUONG T, KOTOWICZ K., This POODLE bites: exploiting the SSL 3. 0 fallback
[5]
CIMATTI A, CLARKE E, GIUNCHIGLIA E, Et al., Nusmv 2: an opensource tool for symbolic model checking, Proc. of the International Conference on Computer Aided Verification, pp. 359-364, (2002)
[6]
BEURDOUCHE B, BHARGAVAN K, DELIGNAT-LAVAUD A, Et al., A messy state of the union: taming the composite state machines of TLS, Proc. of the IEEE Symposium on Security and Privacy, pp. 535-552, (2015)
[7]
BEURDOUCHE B, DELIGNAT-LAVAUD A, KOBEISSI N, Et al., FLEXTLS: a tool for testing TLS implementations, Proc. of the 9th USENIX Conference on Offensive Technologies, (2015)
[8]
SHEN Y Z, GU C X, CHEN X, Et al., Vulnerability analysis of OpenVPN system based on model learning, Journal of Software, 30, 12, pp. 3750-3764, (2019)
[9]
SHEN Y Z, GU C X, CHEN X., Network security protocol vulnerability analysis system based on model learning, Journal of Information Engineering University, 20, 1, pp. 111-115, (2019)
[10]
TSANKOV P, DASHTI M T, BASIN D., SECFUZZ: fuzz-testing security protocols, Proc. of the 7th International Workshop on Automation of Software Test, (2012)