Plaintext-recovery attacks against datagram tls, Network and Distributed System Security Symposium, 2012. ,
On the Robustness of Applications Based on the SSL and TLS Security Protocols, pp.248-264, 2007. ,
DOI : 10.1007/978-3-540-73408-6_18
A messy state of the union, Proceedings of the 36th IEEE Symposium on Security and Privacy, 2015. ,
DOI : 10.1007/978-3-642-54631-0_38
URL : https://hal.archives-ouvertes.fr/hal-01673714
Flextls: A tool for testing tls implementations, 9th USENIX Workshop on Offensive Technologies (WOOT'15), 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01295035
Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS, 2014 IEEE Symposium on Security and Privacy, pp.98-113, 2014. ,
DOI : 10.1109/SP.2014.14
URL : https://hal.archives-ouvertes.fr/hal-01102259
Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH, Proceedings 2016 Network and Distributed System Security Symposium, 2016. ,
DOI : 10.14722/ndss.2016.23418
URL : https://hal.archives-ouvertes.fr/hal-01244855
Planning-Based Security Testing of the SSL/TLS Protocol, 2017 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2017. ,
DOI : 10.1109/ICSTW.2017.63
Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations, 2014 IEEE Symposium on Security and Privacy, 2014. ,
DOI : 10.1109/SP.2014.15
Rfc 5246: The transport layer security (tls) protocol. The Internet Engineering Task Force, 2008. ,
DOI : 10.17487/rfc4346
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.1197-1210, 2015. ,
DOI : 10.1007/978-3-642-40041-4_24
Optimizing IPOG's Vertical Growth with Constraints Based on Hypergraph Coloring, 2017 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pp.181-188, 2017. ,
DOI : 10.1109/ICSTW.2017.37
Transport layer security protocol compression methods, 2004. ,
DOI : 10.17487/rfc3749
Practical Invalid Curve Attacks on TLS-ECDH, European Symposium on Research in Computer Security, pp.407-425, 2015. ,
DOI : 10.1007/BFb0052240
On the Security of the TLS Protocol: A Systematic Analysis, p.CRYPTO, 2013. ,
DOI : 10.1007/978-3-642-40041-4_24
Chapter one-combinatorial testing: Theory and practice, Advances in Computers, vol.99, pp.1-66, 2015. ,
Practical Combinatorial Testing: Beyond Pairwise, IT Professional, vol.10, issue.3, 2008. ,
DOI : 10.1109/MITP.2008.54
IPOG/IPOG-D: efficient test generation for multi-way combinatorial testing, Software Testing, Verification and Reliability, vol.16, issue.10, pp.125-148, 2008. ,
DOI : 10.1002/stvr.381
A crossprotocol attack on the tls protocol, 19th Conference on Computer and Communications Security, 2012. ,
Revisiting ssl/tls implementations: New bleichenbacher side channels and attacks, pp.733-748, 2014. ,
Security Protocol Testing Using Attack Trees, 2009 International Conference on Computational Science and Engineering, pp.690-697, 2009. ,
DOI : 10.1109/CSE.2009.206
LearnLib, Proceedings of the 10th international workshop on Formal methods for industrial critical systems , FMICS '05, pp.62-71, 2005. ,
DOI : 10.1145/1081180.1081189
URL : https://hal.archives-ouvertes.fr/inria-00459959
Protocol state fuzzing of tls implementations, 24th USENIX Security Symposium (USENIX Security 15, pp.193-206, 2015. ,
Combinatorial Methods in Security Testing, Computer, vol.49, issue.10, pp.40-43, 2016. ,
DOI : 10.1109/MC.2016.314
Systematic Fuzzing and Testing of TLS Libraries, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, 2016. ,
DOI : 10.1007/978-3-319-24174-6_21
ACTS: A Combinatorial Test Generation Tool, 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation, pp.370-375, 2013. ,
DOI : 10.1109/ICST.2013.52
An Efficient Algorithm for Constraint Handling in Combinatorial Test Generation, 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation, pp.242-251, 2013. ,
DOI : 10.1109/ICST.2013.35