The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication, Journal of ACM, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01636616
A Calculus for Cryptographic Protocols: The Spi Calculus, Information and Computation, 1999. ,
SATMC: A SAT-Based Model Checker for Security Protocols, Logics in Artificial Intelligence, 2004. ,
Principles of model checking, 2008. ,
Modeling and analyzing security in the presence of compromising adversaries, European Symposium on Research in Computer Security, 2010. ,
Model checking security protocols, Handbook of Model Checking, 2015. ,
OFMC: A symbolic model checker for security protocols, International Journal of Information Security, 2005. ,
Generic and efficient attacker models in spin, Proceedings of the 2014 International SPIN Symposium on Model Checking of Software, 2014. ,
An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001. ,
Automatic Verification of Correspondences for Security Protocols, J. Comput. Secur, 2009. ,
CryptoVerif: Computationally sound mechanized prover for cryptographic protocols". In: Dagstuhl seminar Formal Protocol Verification Applied, 2007. ,
SlowDroid: Turning a Smartphone into a Mobile Attack Vector, 2014 International Conference on Future Internet of Things and Cloud, 2014. ,
, CBMC: Bounded Model Checking for Software
A meta-notation for protocol analysis, Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999. ,
DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice, 2018 IEEE Symposium on Security and Privacy (SP), 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01698177
, Cisco AnyConnect Secure Mobility Client. url
Model checking, 1999. ,
Security Properties: Two Agents Are Sufficient, Programming Languages and Systems, 2003. ,
URL : https://hal.archives-ouvertes.fr/inria-00099981
The Finite Variant Property: How to Get Rid of Some Algebraic Properties, Term Rewriting and Applications, 2005. ,
Tree automata with one memory set constraints and cryptographic protocols, Theoretical Computer Science, 2005. ,
URL : https://hal.archives-ouvertes.fr/inria-00000553
, ARP spoofing, 2018.
The ASTREÉ Analyzer, Programming Languages and Systems, 2005. ,
Key exchange in IPsec revisited: Formal analysis of IKEv1 and IKEv2, European Symposium on Research in Computer Security, 2011. ,
, Frama-C". In: Software Engineering and Formal Methods, 2012.
VCC: Contract-based modular verification of concurrent C, 31st International Conference on Software Engineering -Companion Volume, 2009. ,
The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246, 2008. ,
New directions in cryptography, IEEE transactions on Information Theory, 1976. ,
Authentication and authenticated key exchanges, Designs, Codes and Cryptography, 1992. ,
On the security of public key protocols, IEEE Transactions on Information Theory, 1983. ,
On the security of multi-party ping-pong protocols, 24th Annual Symposium on Foundations of Computer Science, 1983. ,
,
Elliptic Curve Groups modulo a Prime (ECP Groups) for IKE and IKEv2. RFC 5903, 2010. ,
Concise Promela Reference, 1997. ,
Probabilistic encryption, Journal of Computer and System Sciences, 1984. ,
An Identity-Based Key-Exchange Protocol, Advances in Cryptology -EUROCRYPT '89, 1990. ,
The model checker SPIN, IEEE Transactions on Software Engineering, 1997. ,
A Traffic-Based Method of Detecting Dead Internet Key Exchange (IKE) Peers. RFC 3706, 2004. ,
, ICSA Labs Certified Products
, IEEE Standard for Information technology-Telecommunications and information exchange between systems Local and metropolitan area networks-Specific requirements -Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std, vol.802, pp.11-2012, 2016.
,
, IPsec in A10 Networks Thunder Convergent Firewall (CFW)
,
Handbook of applied cryptography, 1996. ,
Internet key exchange protocol version 2 (IKEv2). RFC 7296, 2014. ,
,
Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation, 22nd IEEE Computer Security Foundations Symposium, 2009. ,
,
, Linear Temporal Logic reference in Spin, 2017.
A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, 1997. ,
Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR, Tools and Algorithms for the Construction and Analysis of Systems, 1996. ,
Drawing Message Sequence Charts with L A T E X, 2001. ,
Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer, Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999. ,
The TAMARIN Prover for the Symbolic Analysis of Security Protocols, Computer Aided Verification, 2013. ,
Communicating and mobile systems: the pi calculus, 1999. ,
A calculus of mobile processes, I, Information and Computation, 1992. ,
Automated analysis of cryptographic protocols using Mur/spl phi, IEEE Symposium on Security and Privacy, 1997. ,
PKCS #1: RSA Cryptography Specifications Version 2.2. RFC 8017, 2016. ,
Model Checking the IKEv2 Protocol Using Spin, 17th International Conference on Privacy, Security and Trust (PST), 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02062292
The Deviation Attack: A Novel Denial-of-Service Attack Against IKEv2, 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-01980276
Protecting Internet Key Exchange Protocol Version 2 (IKEv2) Implementations from Distributed Denial-of-Service Attacks. RFC 8019, 2016. ,
,
,
, Our demonstration of the Deviation Attack
, Our Promela model of IKEv2
, Our ProVerif model of IKEv2
, Our Tamarin model of IKEv2
Understanding IKEv2: Tutorial, and rationale for decisions, RFC Editor, 2003. ,
Deliverable D6.2: Specification of the Problems in the High-Level Specification Language, 2003. ,
, Promela semantics
The RC6 Block Cipher, First Advanced Encryption Standard (AES) Conference, 1998. ,
Protocol insecurity with a finite number of sessions and composed keys is NP-complete, Theoretical Computer Science, 2003. ,
Low-fat recipes for SPIN, International SPIN Workshop on Model Checking of Software, 2000. ,
Security Architecture for the Internet Protocol. RFC 4301, 2005. ,
SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis, IEEE Symposium on Security and Privacy, 2016. ,
, Size of the Srizbi botnet
,
ARPspoof software ,
, N. I. of Standards and Technology. Advanced Encryption Standard (AES). Standard, 2001.
, N. I. of Standards and Technology. Digital Signature Standard (DSS). Standard, 2013.
,
, StrongSwan distribution packages
, Swan softwares history
, The Srizbi botnet
,
The CL-Atse Protocol Analyser, Term Rewriting and Applications, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00103573
,
How to Shop for Free Online -Security Analysis of Cashier-asa-Service Based Web Stores, 2011 IEEE Symposium on Security and Privacy, p.148, 2011. ,
American fuzzy lop ,