M. Abadi, B. Blanchet, and C. Fournet, The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication, Journal of ACM, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01636616

M. Abadi and A. D. Gordon, A Calculus for Cryptographic Protocols: The Spi Calculus, Information and Computation, 1999.

A. Armando and L. Compagna, SATMC: A SAT-Based Model Checker for Security Protocols, Logics in Artificial Intelligence, 2004.

C. Baier and J. Katoen, Principles of model checking, 2008.

D. Basin and C. Cremers, Modeling and analyzing security in the presence of compromising adversaries, European Symposium on Research in Computer Security, 2010.

D. Basin, C. Cremers, and C. Meadows, Model checking security protocols, Handbook of Model Checking, 2015.

D. Basin, S. Mödersheim, and L. Viganò, OFMC: A symbolic model checker for security protocols, International Journal of Information Security, 2005.

N. and B. Henda, Generic and efficient attacker models in spin, Proceedings of the 2014 International SPIN Symposium on Model Checking of Software, 2014.

B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001.

B. Blanchet, Automatic Verification of Correspondences for Security Protocols, J. Comput. Secur, 2009.

B. Blanchet, CryptoVerif: Computationally sound mechanized prover for cryptographic protocols". In: Dagstuhl seminar Formal Protocol Verification Applied, 2007.

E. Cambiaso, G. Papaleo, and M. Aiello, SlowDroid: Turning a Smartphone into a Mobile Attack Vector, 2014 International Conference on Future Internet of Things and Cloud, 2014.

, CBMC: Bounded Model Checking for Software

I. Cervesato, A meta-notation for protocol analysis, Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999.

V. Cheval, S. Kremer, and I. Rakotonirina, DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice, 2018 IEEE Symposium on Security and Privacy (SP), 2018.
URL : https://hal.archives-ouvertes.fr/hal-01698177

, Cisco AnyConnect Secure Mobility Client. url

E. M. Clarke, O. Grumberg, and D. Peled, Model checking, 1999.

H. Comon-lundh and V. Cortier, Security Properties: Two Agents Are Sufficient, Programming Languages and Systems, 2003.
URL : https://hal.archives-ouvertes.fr/inria-00099981

H. Comon-lundh and S. Delaune, The Finite Variant Property: How to Get Rid of Some Algebraic Properties, Term Rewriting and Applications, 2005.

H. Comon and V. Cortier, Tree automata with one memory set constraints and cryptographic protocols, Theoretical Computer Science, 2005.
URL : https://hal.archives-ouvertes.fr/inria-00000553

W. Contributors, ARP spoofing, 2018.

P. Cousot, The ASTREÉ Analyzer, Programming Languages and Systems, 2005.

C. Cremers, Key exchange in IPsec revisited: Formal analysis of IKEv1 and IKEv2, European Symposium on Research in Computer Security, 2011.

P. Cuoq, Frama-C". In: Software Engineering and Formal Methods, 2012.

M. Dahlweid, VCC: Contract-based modular verification of concurrent C, 31st International Conference on Software Engineering -Companion Volume, 2009.

T. Dierks and E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246, 2008.

W. Diffie and M. Hellman, New directions in cryptography, IEEE transactions on Information Theory, 1976.

W. Diffie, P. C. Van-oorschot, and M. J. Wiener, Authentication and authenticated key exchanges, Designs, Codes and Cryptography, 1992.

D. Dolev and A. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, 1983.

S. Even and O. Goldreich, On the security of multi-party ping-pong protocols, 24th Annual Symposium on Foundations of Computer Science, 1983.

/. Frees and . Wan,

D. Fu and J. Solinas, Elliptic Curve Groups modulo a Prime (ECP Groups) for IKE and IKEv2. RFC 5903, 2010.

R. Gerth, Concise Promela Reference, 1997.

S. Goldwasser and S. Micali, Probabilistic encryption, Journal of Computer and System Sciences, 1984.

C. G. Günther, An Identity-Based Key-Exchange Protocol, Advances in Cryptology -EUROCRYPT '89, 1990.

G. J. Holzmann, The model checker SPIN, IEEE Transactions on Software Engineering, 1997.

G. Huang, S. Beaulieu, and D. Rochefort, A Traffic-Based Method of Detecting Dead Internet Key Exchange (IKE) Peers. RFC 3706, 2004.

, ICSA Labs Certified Products

, IEEE Standard for Information technology-Telecommunications and information exchange between systems Local and metropolitan area networks-Specific requirements -Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std, vol.802, pp.11-2012, 2016.

F. Ipsec-at,

, IPsec in A10 Networks Thunder Convergent Firewall (CFW)

M. Ipsec-in,

J. Katz, Handbook of applied cryptography, 1996.

C. Kaufman, Internet key exchange protocol version 2 (IKEv2). RFC 7296, 2014.

K. Llvm-execution-engine,

R. Küsters and T. Truderung, Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation, 22nd IEEE Computer Security Foundations Symposium, 2009.

. Libreswan,

, Linear Temporal Logic reference in Spin, 2017.

G. Lowe, A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, 1997.

G. Lowe, Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR, Tools and Algorithms for the Construction and Analysis of Systems, 1996.

S. Mauw and V. Bos, Drawing Message Sequence Charts with L A T E X, 2001.

C. Meadows, Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer, Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999.

S. Meier, The TAMARIN Prover for the Symbolic Analysis of Security Protocols, Computer Aided Verification, 2013.

R. Milner, Communicating and mobile systems: the pi calculus, 1999.

R. Milner, J. Parrow, and D. Walker, A calculus of mobile processes, I, Information and Computation, 1992.

J. C. Mitchell, M. Mitchell, and U. Stern, Automated analysis of cryptographic protocols using Mur/spl phi, IEEE Symposium on Security and Privacy, 1997.

K. Moriarty, PKCS #1: RSA Cryptography Specifications Version 2.2. RFC 8017, 2016.

T. Ninet, Model Checking the IKEv2 Protocol Using Spin, 17th International Conference on Privacy, Security and Trust (PST), 2019.
URL : https://hal.archives-ouvertes.fr/hal-02062292

T. Ninet, The Deviation Attack: A Novel Denial-of-Service Attack Against IKEv2, 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2019.
URL : https://hal.archives-ouvertes.fr/hal-01980276

Y. Nir and V. Smyslov, Protecting Internet Key Exchange Protocol Version 2 (IKEv2) Implementations from Distributed Denial-of-Service Attacks. RFC 8019, 2016.

O. Iked,

. Openswan,

, Our demonstration of the Deviation Attack

, Our Promela model of IKEv2

, Our ProVerif model of IKEv2

, Our Tamarin model of IKEv2

R. Perlman, Understanding IKEv2: Tutorial, and rationale for decisions, RFC Editor, 2003.

A. Project, Deliverable D6.2: Specification of the Problems in the High-Level Specification Language, 2003.

, Promela semantics

R. L. Rivest, The RC6 Block Cipher, First Advanced Encryption Standard (AES) Conference, 1998.

M. Rusinowitch and M. Turuani, Protocol insecurity with a finite number of sessions and composed keys is NP-complete, Theoretical Computer Science, 2003.

T. C. Ruys, Low-fat recipes for SPIN, International SPIN Workshop on Model Checking of Software, 2000.

K. S. and S. K. , Security Architecture for the Internet Protocol. RFC 4301, 2005.

Y. Shoshitaishvili, SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis, IEEE Symposium on Security and Privacy, 2016.

, Size of the Srizbi botnet

. Slowloris,

D. Song, ARPspoof software

, N. I. of Standards and Technology. Advanced Encryption Standard (AES). Standard, 2001.

, N. I. of Standards and Technology. Digital Signature Standard (DSS). Standard, 2013.

. Strongswan,

, StrongSwan distribution packages

, Swan softwares history

, The Srizbi botnet

Z. The and . Fuzzer,

M. Turuani, The CL-Atse Protocol Analyser, Term Rewriting and Applications, 2006.
URL : https://hal.archives-ouvertes.fr/inria-00103573

. Tutorial,

R. Wang, How to Shop for Free Online -Security Analysis of Cashier-asa-Service Based Web Stores, 2011 IEEE Symposium on Security and Privacy, p.148, 2011.

M. Zalewski, American fuzzy lop