Cited By
View all- Shi QXu XZhang XCalandrino JTroncoso C(2023)Extracting protocol format as state machine via controlled static loop analysisProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620630(7019-7036)Online publication date: 9-Aug-2023
- Paterson KScarlata MTruong KCalandrino JTroncoso C(2023)Three lessons from threemaProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620310(1289-1306)Online publication date: 9-Aug-2023
- Fischlin MMeng WJensen CCremers CKirda E(2023)Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623099(2901-2914)Online publication date: 15-Nov-2023
- Show More Cited By