Author:
Chau Sze Yiu,Chowdhury Omar,Hoque Endadul,Ge Huangyi,Kate Aniket,Nita-Rotaru Cristina,Li Ninghui
Cited by
38 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. SoK: Automated Software Testing for TLS Libraries;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
2. Monitor-based Testing of Network Protocol Implementations Using Symbolic Execution;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
3. A compliance-based ranking of certificate authorities using probabilistic approaches;International Journal of Information Security;2024-05-29
4. ARMOR: A Formally Verified Implementation of X.509 Certificate Chain Validation;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
5. DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19