Commit 3fcdc57a authored by Frits Vaandrager's avatar Frits Vaandrager
Browse files

bibliography edits

parent c5a24fc4
......@@ -40,43 +40,33 @@
@MastersThesis{Boss2012,
title={Evaluating implementations of SSH by means of model-based testing},
author={Lenaerts, T.},
author={E. Boss},
year={2012},
document_type = {Bachelor's Thesis},
type = {Bachelor's Thesis},
howpublished = {Online \url{https://pdfs.semanticscholar.org/8841/47071555f50b614c6af640cea5152fee10f2.pdf}},
school = {Radboud University}
}
@article{Udrea_rule-based_2008,
title = {Rule-based static analysis of network protocol implementations},
volume = {206},
issn = {08905401},
url = {http://linkinghub.elsevier.com/retrieve/pii/S0890540107001332},
doi = {10.1016/j.ic.2007.05.007},
language = {en},
number = {2-4},
urldate = {2017-02-13},
journal = {Information and Computation},
author = {Udrea, Octavian and Lumezanu, Cristian and Foster, Jeffrey S.},
month = feb,
year = {2008},
keywords = {ssh},
pages = {130--157},
file = {1-s2.0-S0890540107001332-main.pdf:C\:\\Users\\Paul\\AppData\\Roaming\\Zotero\\Zotero\\Profiles\\tt1zn5x1.default\\zotero\\storage\\HIVN5QUU\\1-s2.0-S0890540107001332-main.pdf:application/pdf}
}
@MastersThesis{Toon2016,
title={Evaluating implementations of SSH by means of model-based testing},
author={Lenaerts, T},
title={Improving Protocol State Fuzzing of SSH},
author={Lenaerts, Toon},
year={2016},
document_type = {Bachelor's Thesis},
type = {Bachelor's Thesis},
howpublished = {Online},
school = {Radboud University}
}
@phdthesis{Isberner2015,
author = {Malte Isberner},
year = 2015,
......@@ -106,21 +96,12 @@ document_type = {Bachelor's Thesis},
abstract = {The problem of identifying an unknown regular set from examples of its members and nonmembers is addressed. It is assumed that the regular set is presented by a minimally adequate Teacher, which can answer membership queries about the set and can also test a conjecture and indicate whether it is equal to the unknown set and provide a counterexample if not. (A counterexample is a string in the symmetric difference of the correct set and the conjectured set.) A learning algorithm L∗ is described that correctly learns any regular set from any minimally adequate Teacher in time polynomial in the number of states of the minimum dfa for the set and the maximum length of any counterexample provided by the Teacher. It is shown that in a stochastic setting the ability of the Teacher to test conjectures may be replaced by a random sampling oracle, {EX}( ). A polynomial-time learning algorithm is shown for a particular problem of context-free language identification.},
address = {Duluth, MN, USA},
author = {Angluin, Dana},
citeulike-article-id = {2189861},
citeulike-linkout-0 = {http://portal.acm.org/citation.cfm?id=36889},
citeulike-linkout-1 = {http://dx.doi.org/10.1016/0890-5401(87)90052-6},
citeulike-linkout-2 = {http://www.sciencedirect.com/science/article/B6WGK-4DX444W-57/1/495604548d869ef5267ea44746bdd205},
doi = {10.1016/0890-5401(87)90052-6},
issn = {08905401},
journal = {Information and Computation},
month = nov,
number = {2},
pages = {87--106},
posted-at = {2015-12-07 14:09:17},
priority = {2},
publisher = {Academic Press, Inc.},
title = {Learning regular sets from queries and counterexamples},
url = {http://dx.doi.org/10.1016/0890-5401(87)90052-6},
volume = {75},
year = {1987}
}
......@@ -144,13 +125,9 @@ document_type = {Bachelor's Thesis},
year = {2010}
}
@article{rfc4250,
@misc{rfc4250,
author = {Lehtinen, Sami},
citeulike-article-id = {13841736},
editor = {Lonvick, Chris},
month = jan,
posted-at = {2015-11-19 11:26:21},
priority = {2},
title = {The Secure Shell ({SSH}) Protocol Assigned Numbers. {RFC} 4250, The Internet Engineering Task Force, Network Working Group},
year = {2006}
}
......@@ -182,11 +159,7 @@ machine learning algorithms},
title = {Generating Models of Infinite-State Communication Protocols using Regular Inference with Abstraction},
journal= {Formal Methods in System Design},
year= {2015},
issn= {0925-9856},
doi= {10.1007/s10703-014-0216-x},
url= {http://dx.doi.org/10.1007/s10703-014-0216-x},
publisher= {Springer},
keywords= {Active automata learning; Mealy machines; Abstraction techniques; Communication protocols; Session initiation protocol; Transmission control protocol},
volume = 46,
number = 1,
pages= {1-41}
......@@ -213,29 +186,31 @@ machine learning algorithms},
number = {47},
pages = {4029--4054},
year = {2010},
url = {http://dx.doi.org/10.1016/j.tcs.2010.07.008},
doi = {10.1016/j.tcs.2010.07.008}
}
@inproceedings{tomte2015,
title={Learning register automata with fresh value generation},
author={Aarts, Fides and Fiterau-Brostean, Paul and Kuppens, Harco and Vaandrager, Frits},
booktitle={International Colloquium on Theoretical Aspects of Computing},
pages={165--183},
year={2015},
organization={Springer}
author = {Fides Aarts and Paul Fiter\u{a}u-Bro\c{s}tean and Harco Kuppens and Frits W. Vaandrager},
title = {Learning Register Automata with Fresh Value Generation},
booktitle = {Theoretical Aspects of Computing - {ICTAC} 2015 - 12th International
Colloquium Cali, Colombia, October 29-31, 2015, Proceedings},
pages = {165--183},
year = {2015},
editor = {Martin Leucker and
Camilo Rueda and
Frank D. Valencia},
series = {Lecture Notes in Computer Science},
volume = {9399},
publisher = {Springer}
}
@inproceedings{ralib2015,
title = {{RALib}: {A} {LearnLib} extension for inferring {EFSMs}},
shorttitle = {{RALib}},
url = {https://it.uu.se/katalog/socas172/thesis/difts-final.pdf},
urldate = {2016-09-05},
booktitle = {{DIFTS}},
author = {Cassel, Sofia and Howar, Falk and Jonsson, Bengt},
year = {2015},
keywords = {learning, ralib, register-automata},
file = {2015-RALib A LearnLib extension for inferring EFSMs.pdf:C\:\\Users\\Paul\\AppData\\Roaming\\Zotero\\Zotero\\Profiles\\tt1zn5x1.default\\zotero\\storage\\TQUR4TS7\\2015-RALib A LearnLib extension for inferring EFSMs.pdf:application/pdf}
}
@inproceedings{Chalupar2014Automated,
......@@ -253,18 +228,11 @@ machine learning algorithms},
@incollection{Aarts2010Inference,
author = {Aarts, Fides and Schmaltz, Julien and Vaandrager, Frits},
booktitle = {Leveraging Applications of Formal Methods, Verification, and Validation},
citeulike-article-id = {13837719},
citeulike-linkout-0 = {http://dx.doi.org/10.1007/978-3-642-16558-0_54},
citeulike-linkout-1 = {http://link.springer.com/chapter/10.1007/978-3-642-16558-0_54},
doi = {10.1007/978-3-642-16558-0_54},
editor = {Margaria, Tiziana and Steffen, Bernhard},
pages = {673--686},
posted-at = {2015-11-13 14:56:16},
priority = {2},
publisher = {Springer},
series = {LNCS},
title = {Inference and Abstraction of the Biometric Passport},
url = {http://dx.doi.org/10.1007/978-3-642-16558-0_54},
volume = {6415},
year = {2010}
}
......@@ -273,67 +241,42 @@ machine learning algorithms},
abstract = {The secure shell ({SSH}) protocol is one of the most popular cryptographic protocols on the Internet. Unfortunately, the current {SSH} authenticated encryption mechanism is insecure. In this paper, we propose several fixes to the {SSH} protocol and, using techniques from modern cryptography, we prove that our modified versions of {SSH} meet strong new chosen-ciphertext privacy and integrity requirements. Furthermore, our proposed fixes will require relatively little modification to the {SSH} protocol and to {SSH} implementations. We believe that our new notions of privacy and integrity for encryption schemes with stateful decryption algorithms will be of independent interest.},
address = {New York, NY, USA},
author = {Bellare, Mihir and Kohno, Tadayoshi and Namprempre, Chanathip},
citeulike-article-id = {567543},
citeulike-linkout-0 = {http://portal.acm.org/citation.cfm?id=996945},
citeulike-linkout-1 = {http://dx.doi.org/10.1145/996943.996945},
doi = {10.1145/996943.996945},
issn = {1094-9224},
journal = {ACM Trans. Inf. Syst. Secur.},
month = may,
number = {2},
pages = {206--241},
posted-at = {2015-11-13 13:57:14},
priority = {2},
publisher = {ACM},
title = {Breaking and Provably Repairing the {SSH} Authenticated Encryption Scheme: A Case Study of the {Encode-then-Encrypt}-{and-MAC} Paradigm},
url = {http://dx.doi.org/10.1145/996943.996945},
volume = {7},
year = {2004}
}
@article{rfc4254,
@misc{rfc4254,
author = {Ylonen, Tatu},
citeulike-article-id = {13837671},
editor = {Lonvick, C.},
month = jan,
posted-at = {2015-11-13 13:11:06},
priority = {2},
title = {The Secure Shell ({SSH}) Connection Protocol. {RFC} 4254, The Internet Engineering Task Force, Network Working Group},
year = {2006}
}
@article{rfc4252,
@misc{rfc4252,
author = {Ylonen, Tatu},
citeulike-article-id = {13837669},
editor = {Lonvick, C.},
month = jan,
posted-at = {2015-11-13 13:10:46},
priority = {2},
title = {The Secure Shell ({SSH}) Authentication Protocol. {RFC} 4252, The Internet Engineering Task Force, Network Working Group},
year = {2006}
}
@article{rfc4253,
@misc{rfc4253,
author = {Ylonen, Tatu},
citeulike-article-id = {13837668},
editor = {Lonvick, C.},
month = jan,
posted-at = {2015-11-13 13:10:24},
priority = {2},
title = {The Secure Shell ({SSH}) Transport Layer Protocol. {RFC} 4253, The Internet Engineering Task Force, Network Working Group},
year = {2006}
}
@article{rfc4251,
@misc{rfc4251,
author = {Ylonen, Tatu},
citeulike-article-id = {13837660},
citeulike-linkout-0 = {https://www.ietf.org/rfc/rfc4253.txt},
editor = {Lonvick, C.},
month = jan,
posted-at = {2015-11-13 13:05:12},
priority = {2},
title = {The Secure Shell ({SSH}) Protocol Architecture. {RFC} 4251, The Internet Engineering Task Force, Network Working Group},
url = {https://www.ietf.org/rfc/rfc4253.txt},
year = {2006}
}
......@@ -353,18 +296,11 @@ machine learning algorithms},
@incollection{Paterson2010PlaintextDependent,
author = {Paterson, Kenneth G. and Watson, Gaven J.},
booktitle = {Advances in Cryptology – EUROCRYPT 2010},
citeulike-article-id = {13837630},
citeulike-linkout-0 = {http://dx.doi.org/10.1007/978-3-642-13190-5_18},
citeulike-linkout-1 = {http://link.springer.com/chapter/10.1007/978-3-642-13190-5_18},
doi = {10.1007/978-3-642-13190-5_18},
editor = {Gilbert, Henri},
pages = {345--361},
posted-at = {2015-11-13 12:20:10},
priority = {2},
publisher = {Springer},
series = {LNCS},
title = {{Plaintext-Dependent} Decryption: A Formal Security Treatment of {SSH}-{CTR}},
url = {http://dx.doi.org/10.1007/978-3-642-13190-5_18},
volume = {6110},
year = {2010}
}
......@@ -393,22 +329,12 @@ machine learning algorithms},
address = {Washington, DC, USA},
author = {Albrecht, Martin R. and Paterson, Kenneth G. and Watson, Gaven J.},
booktitle = {Security and Privacy, 2009 30th IEEE Symposium on},
citeulike-article-id = {13824119},
citeulike-linkout-0 = {http://portal.acm.org/citation.cfm?id=1608121},
citeulike-linkout-1 = {http://dx.doi.org/10.1109/sp.2009.5},
citeulike-linkout-2 = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5207634},
doi = {10.1109/sp.2009.5},
institution = {Inf. Security Group, Univ. of London, Egham, UK},
isbn = {978-0-7695-3633-0},
issn = {1081-6011},
month = may,
pages = {16--26},
posted-at = {2015-11-13 12:14:05},
priority = {2},
publisher = {IEEE},
series = {SP '09},
title = {Plaintext Recovery Attacks against {SSH}},
url = {http://dx.doi.org/10.1109/sp.2009.5},
year = {2009}
}
......@@ -441,36 +367,24 @@ machine learning algorithms},
@inproceedings{Aarts2013Formal,
author = {Aarts, Fides and de Ruiter, Joeri and Poll, Erik},
booktitle = {Software Testing, Verification and Validation Workshops (ICSTW), 2013 IEEE Sixth International Conference on},
citeulike-article-id = {13780037},
citeulike-linkout-0 = {http://dx.doi.org/10.1109/icstw.2013.60},
citeulike-linkout-1 = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6571671},
doi = {10.1109/icstw.2013.60},
isbn = {978-1-4799-1324-4},
month = mar,
pages = {461--468},
posted-at = {2015-10-01 10:04:08},
priority = {2},
publisher = {IEEE},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
title = {Formal Models of Bank Cards for Free},
url = {http://dx.doi.org/10.1109/icstw.2013.60},
year = {2013}
}
@Inbook{TCP2016,
author="Fiter{\u{a}}u-Bro{\c{s}}tean, Paul
and Janssen, Ramon
and Vaandrager, Frits",
editor="Chaudhuri, Swarat
and Farzan, Azadeh",
title="Combining Model Learning and Model Checking to Analyze TCP Implementations",
bookTitle="Computer Aided Verification: 28th International Conference, CAV 2016, Toronto, ON, Canada, July 17-23, 2016, Proceedings, Part II",
year="2016",
publisher="Springer",
address="Cham",
pages="454--471",
isbn="978-3-319-41540-6",
doi="10.1007/978-3-319-41540-6_25",
url="http://dx.doi.org/10.1007/978-3-319-41540-6_25"
@inproceedings{TCP2016,
author = {P. Fiter\u{a}u-Bro\c{s}tean and R. Janssen and F.W. Vaandrager},
title = {Combining Model Learning and Model Checking to Analyze {TCP} Implementations},
year = 2016,
booktitle = {Proceedings 28th International Conference on Computer Aided Verification (CAV'16), {\rm Toronto, Ontario, Canada}},
editor = {S. Chaudhuri and A. Farzan},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {9780},
pages = {454-471},
}
@electronic{WheelerHow,
......@@ -556,18 +470,11 @@ machine learning algorithms},
@incollection{Wang2011Inferring,
author = {Wang, Yipeng and Zhang, Zhibin and Yao, Danfeng and Qu, Buyun and Guo, Li},
booktitle = {Applied Cryptography and Network Security},
citeulike-article-id = {13778660},
citeulike-linkout-0 = {http://dx.doi.org/10.1007/978-3-642-21554-4_1},
citeulike-linkout-1 = {http://link.springer.com/chapter/10.1007/978-3-642-21554-4_1},
doi = {10.1007/978-3-642-21554-4_1},
editor = {Lopez, Javier and Tsudik, Gene},
pages = {1--18},
posted-at = {2015-09-30 07:56:06},
priority = {2},
publisher = {Springer},
series = {LNCS},
title = {Inferring Protocol State Machine from Network Traces: A Probabilistic Approach},
url = {http://dx.doi.org/10.1007/978-3-642-21554-4_1},
volume = {6715},
year = {2011}
}
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment