References

  1. OpenSSL. Available at https://www.openssl.org/. Accessed: 2017-06-07.
  2. TLS-Attacker. Available at https://github.com/RUB-NDS/TLS-Attacker. Accessed: 2016-12-04.
  3. Reynald Affeldt & Nicolas Marti (2013): Towards Formal Verification of TLS Network Packet Processing Written in C. In: PLPV, doi:10.1145/2428116.2428124.
  4. Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J. Alex Halderman, Viktor Dukhovni, Emilia Käsper, Shaanan Cohney, Susanne Engels, Christof Paar & Yuval Shavitt (2016): DROWN: Breaking TLS Using SSLv2. In: Thorsten Holz & Stefan Savage: 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016.. USENIX Association, pp. 689–706. Available at https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/aviram.
  5. Manfred Broy, Bengt Jonsson, Joost-Pieter Katoen, Martin Leucker & Alexander Pretschner (2005): Model-Based Testing of Reactive Systems, Advanced Lectures [The volume is the outcome of a research seminar that was held in Schloss Dagstuhl in January 2004]. Lecture Notes in Computer Science 3472. Springer, doi:10.1007/b137241.
  6. Chad Brubaker, Suman Jana, Baishakhi Ray, Sarfraz Khurshid & Vitaly Shmatikov (2014): Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations. In: 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014. IEEE Computer Society, pp. 114–129, doi:10.1109/SP.2014.15.
  7. David Champelovier, Xavier Clerc, Hubert Garavel, Yves Guerte, Frédéric Lang, Christine McKinty, Vincent Powazny, Wendelin Serwe & Gideon Smeding (2017): Reference Manual of the LNT to LOTOS Translator. Available at http://cadp.inria.fr/publications/Champelovier-Clerc-Garavel-et-al-10.html.
  8. G. Diaz, F. Cuartero, V. Valero & F. Pelayo (2004): Automatic Verification of the TLS HandShake Protocol. In: Proceedings of the 19th ACM Symposium on Applied Computing (SAC'04), doi:10.1145/967900.968063.
  9. Tim Dierks & Eric Rescorla (2006): The Transport Layer Security (TLS) Protocol Version 1.1. RFC 4346, pp. 1–87, doi:10.17487/RFC4346.
  10. Zakir Durumeric, James Kasten, David Adrian, J. Alex Halderman, Michael Bailey, Frank Li, Nicholas Weaver, Johanna Amann, Jethro Beekman, Mathias Payer & Vern Paxson (2014): The Matter of Heartbleed. In: Carey Williamson, Aditya Akella & Nina Taft: Proceedings of the 2014 Internet Measurement Conference, IMC 2014, Vancouver, BC, Canada, November 5-7, 2014. ACM, pp. 475–488, doi:10.1145/2663716.2663755.
  11. Hubert Garavel, Frédéric Lang, Radu Mateescu & Wendelin Serwe (2013): CADP 2011: a toolbox for the construction and analysis of distributed processes. STTT 15(2), pp. 89–107, doi:10.1007/s10009-012-0244-z.
  12. Hubert Garavel, Frédéric Lang & Wendelin Serwe (2017): From LOTOS to LNT. In: ModelEd, TestEd, TrustEd - Essays Dedicated to Ed Brinksma on the Occasion of His 60th Birthday, pp. 3–26, doi:10.1007/978-3-319-68270-9_1.
  13. IETF (2018): The Transport Layer Security (TLS) Protocol Version 1.4 draft-ietf-tls-tls13-24. Available at https://tools.ietf.org/html/draft-ietf-tls-tls13-24.
  14. D. Kaloper-Mersinjak & H. Mehnert (2016): Not-quite-so-broken TLS 1.3 mechanised conformance checking. In: TLSv1.3 - Ready or Not? (TRON) Workshop. Available at https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/kaloper-mersinjak.
  15. Lina Marsso, Radu Mateescu & Wendelin Serwe: TESTOR: A Modular Tool for On-the-Fly Conformance Test Case Generation. To appear at TACAS 2018.
  16. E. Poll, J. de Ruiter & A. Schubert (2015): Protocol state machines and session languages: specification, implementation, and security flaws. In: Security and Privacy Workshops (SPW), doi:10.1109/SPW.2015.32.
  17. Joeri de Ruiter & Erik Poll (2015): Protocol State Fuzzing of TLS Implementations. In: Jaeyeon Jung & Thorsten Holz: 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015.. USENIX Association, pp. 193–206. Available at https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/de-ruiter.
  18. D. E. Simos, J. Bozic, F. Duan, B. Garn, K. Kleine, Y. Lei & F. Wotawa (2017): Testing TLS Using Combinatorial Methods and Execution Framework. In: Proceedings of the IFIP International Conference on Testing Software and Systems (ICTSS'17), doi:10.1007/978-3-319-67549-7_10.
  19. Jan Tretmans (1996): Conformance Testing with Labelled Transition Systems: Implementation Relations and Test Generation. Computer Networks and ISDN Systems 29(1), pp. 49–79, doi:10.1016/S0169-7552(96)00017-7.
  20. Alfred C. Weaver (2006): Secure Sockets Layer. IEEE Computer 39(4), pp. 88–90, doi:10.1109/MC.2006.138.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org