Funder
Österreichische Forschungsförderungsgesellschaft
Publisher
Springer Science and Business Media LLC
Subject
Safety, Risk, Reliability and Quality,Software
Reference39 articles.
1. AlFardan, N., & Paterson, K.G. (2012). Plaintext-recovery attacks against datagram tls. In Network and distributed system security symposium (NDSS 2012).
2. Berbecaru, D., & Lioy, A. (2007). On the robustness of applications based on the ssl and tls security protocol. In European Public key infrastructure workshop (pp. 248–264). Springer.
3. Beurdouche, B., Bhargavan, K., Delignat-Lavaud, A., Fournet, C., Kohlweiss, M., Pironti, A., Strub, P.Y., Zinzindohoue, J.K. (2015). A messy state of the union: taming the composite state machines of tls. In Proceedings of the 36th IEEE symposium on security and privacy.
4. Beurdouche, B., Delignat-Lavaud, A., Kobeissi, N., Pironti, A., Bhargavan, K. (2015). Flextls: a tool for testing tls implementations. In 9th USENIX Workshop on offensive technologies (WOOT’15).
5. Bhargavan, K., & Leurent, G. (2016). Transcript collision attacks: breaking authentication in tls, ike, and ssh. In Network and distributed system security symposium–NDSS 2016.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A novel combinatorial testing approach with fuzzing strategy;Journal of Software: Evolution and Process;2023-02-02
2. Combinatorial methods for dynamic gray‐box SQL injection testing;Software Testing, Verification and Reliability;2022-07-04
3. Requirement-Based Automated Test Case Generation: Systematic Literature Review;VFAST Transactions on Software Engineering;2022-06-28
4. CA2: Practical Archival and Compression of Covering Arrays;2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW);2022-04
5. Factorials Experiments, Covering Arrays, and Combinatorial Testing;Mathematics in Computer Science;2021-04-12