N. Alfardan and K. G. Paterson, Plaintext-recovery attacks against datagram tls, Network and Distributed System Security Symposium, 2012.

D. Berbecaru and A. Lioy, On the Robustness of Applications Based on the SSL and TLS Security Protocols, pp.248-264, 2007.
DOI : 10.1007/978-3-540-73408-6_18

B. Beurdouche, K. Bhargavan, A. Delignat-lavaud, C. Fournet, M. Kohlweiss et al., A messy state of the union, Proceedings of the 36th IEEE Symposium on Security and Privacy, 2015.
DOI : 10.1007/978-3-642-54631-0_38

URL : https://hal.archives-ouvertes.fr/hal-01673714

B. Beurdouche, A. Delignat-lavaud, N. Kobeissi, A. Pironti, and K. Bhargavan, Flextls: A tool for testing tls implementations, 9th USENIX Workshop on Offensive Technologies (WOOT'15), 2015.
URL : https://hal.archives-ouvertes.fr/hal-01295035

K. Bhargavan, A. D. Lavaud, C. Fournet, A. Pironti, and P. Y. Strub, Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS, 2014 IEEE Symposium on Security and Privacy, pp.98-113, 2014.
DOI : 10.1109/SP.2014.14

URL : https://hal.archives-ouvertes.fr/hal-01102259

K. Bhargavan and G. Leurent, Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH, Proceedings 2016 Network and Distributed System Security Symposium, 2016.
DOI : 10.14722/ndss.2016.23418

URL : https://hal.archives-ouvertes.fr/hal-01244855

J. Bozic, K. Kleine, D. E. Simos, and F. Wotawa, Planning-Based Security Testing of the SSL/TLS Protocol, 2017 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2017.
DOI : 10.1109/ICSTW.2017.63

C. Brubaker, S. Jana, B. Ray, S. Khurshid, and V. Shmatikov, Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations, 2014 IEEE Symposium on Security and Privacy, 2014.
DOI : 10.1109/SP.2014.15

T. Dierks and E. Rescorla, Rfc 5246: The transport layer security (tls) protocol. The Internet Engineering Task Force, 2008.
DOI : 10.17487/rfc4346

B. Dowling, M. Fischlin, F. Günther, and D. Stebila, A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.1197-1210, 2015.
DOI : 10.1007/978-3-642-40041-4_24

F. Duan, Y. Lei, L. Yu, R. N. Kacker, and D. R. Kuhn, Optimizing IPOG's Vertical Growth with Constraints Based on Hypergraph Coloring, 2017 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pp.181-188, 2017.
DOI : 10.1109/ICSTW.2017.37

S. Hollenbeck, Transport layer security protocol compression methods, 2004.
DOI : 10.17487/rfc3749

T. Jager, J. Schwenk, and J. Somorovsky, Practical Invalid Curve Attacks on TLS-ECDH, European Symposium on Research in Computer Security, pp.407-425, 2015.
DOI : 10.1007/BFb0052240

H. Krawczyk, K. G. Paterson, and H. Wee, On the Security of the TLS Protocol: A Systematic Analysis, p.CRYPTO, 2013.
DOI : 10.1007/978-3-642-40041-4_24

D. R. Kuhn, R. Bryce, F. Duan, L. S. Ghandehari, Y. Lei et al., Chapter one-combinatorial testing: Theory and practice, Advances in Computers, vol.99, pp.1-66, 2015.

R. Kuhn, Y. Lei, and R. Kacker, Practical Combinatorial Testing: Beyond Pairwise, IT Professional, vol.10, issue.3, 2008.
DOI : 10.1109/MITP.2008.54

Y. Lei, R. Kacker, D. R. Kuhn, V. Okun, and J. Lawrence, IPOG/IPOG-D: efficient test generation for multi-way combinatorial testing, Software Testing, Verification and Reliability, vol.16, issue.10, pp.125-148, 2008.
DOI : 10.1002/stvr.381

N. Mavrogiannopoulos, F. Vercauteren, V. Velichkov, and B. Preneel, A crossprotocol attack on the tls protocol, 19th Conference on Computer and Communications Security, 2012.

C. Meyer, J. Somorovsky, E. Weiss, J. Schwenk, S. Schinzel et al., Revisiting ssl/tls implementations: New bleichenbacher side channels and attacks, pp.733-748, 2014.

A. Morais, E. Martins, A. Cavalli, and W. Jimenez, Security Protocol Testing Using Attack Trees, 2009 International Conference on Computational Science and Engineering, pp.690-697, 2009.
DOI : 10.1109/CSE.2009.206

H. Raffelt, B. Steffen, and T. Berg, LearnLib, Proceedings of the 10th international workshop on Formal methods for industrial critical systems , FMICS '05, pp.62-71, 2005.
DOI : 10.1145/1081180.1081189

URL : https://hal.archives-ouvertes.fr/inria-00459959

J. De-ruiter and E. Poll, Protocol state fuzzing of tls implementations, 24th USENIX Security Symposium (USENIX Security 15, pp.193-206, 2015.

D. E. Simos, R. Kuhn, A. G. Voyiatzis, and R. Kacker, Combinatorial Methods in Security Testing, Computer, vol.49, issue.10, pp.40-43, 2016.
DOI : 10.1109/MC.2016.314

J. Somorovsky, Systematic Fuzzing and Testing of TLS Libraries, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, 2016.
DOI : 10.1007/978-3-319-24174-6_21

L. Yu, Y. Lei, R. N. Kacker, and D. R. Kuhn, ACTS: A Combinatorial Test Generation Tool, 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation, pp.370-375, 2013.
DOI : 10.1109/ICST.2013.52

L. Yu, Y. Lei, M. Nourozborazjany, R. N. Kacker, and D. R. Kuhn, An Efficient Algorithm for Constraint Handling in Combinatorial Test Generation, 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation, pp.242-251, 2013.
DOI : 10.1109/ICST.2013.35