Commit b405ef7a authored by Erik Poll's avatar Erik Poll
Browse files

unambiguated

parent 9144fabf
......@@ -91,7 +91,8 @@ tabsize=2
\begin{abstract}
We apply model learning on three SSH implementations to infer state machine models, and then use model checking
to verify that these models satisfy basic security properties and conform to the RFCs. Our analysis showed that
all tested SSH server models satisfy the stated security properties. However, our analysis uncovered several standard violations.
all tested SSH server models satisfy the stated security properties.
However, our analysis uncovered several violations of the standard.
%Frits: I would say the fingerprinting is a detail, standard violations much more important.
%The state machines of the implementations differ significantly, allowing them to be
%effectively fingerprinted.
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment