2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC) 2018
DOI: 10.1109/compsac.2018.10325
|View full text |Cite
|
Sign up to set email alerts
|

Experience Report: How to Extract Security Protocols' Specifications from C Libraries

Abstract: Abstract-Often, analysts have to face a challenging situation when formally verifying the implementation of a security protocol: they need to build a model of the protocol from only poorly or not documented code, and with little or no help from the developers to better understand it. Security protocols implementations frequently use services provided by libraries coded in the C programming language; automatic tools for codelevel reverse engineering offer good support to comprehend the behavior of code in objec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…Following the approach in [22], we executed the first step of the methodology proposed here in Sec. 2.1 by reverse engineering a fragment of the source code files.…”
Section: The P ≡ P Protocolmentioning
confidence: 99%
“…Following the approach in [22], we executed the first step of the methodology proposed here in Sec. 2.1 by reverse engineering a fragment of the source code files.…”
Section: The P ≡ P Protocolmentioning
confidence: 99%