[1]Hussain S, Chowdhury O, Mehnaz S, et al. LTEInspector: A systematic approach for adversarial testing of 4G LTE[EBOL]. [20241029]. https:www.ndsssymposium.orgwpcontentuploads201802ndss2018_02A3_Hussain_paper.pdf[2]Basin D, Dreier J, Hirschi L, et al. A formal analysis of 5G authentication[C] Proc of the 2018 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2018: 13831396[3]Cremers C, Horvat M, Scott S, et al. Automated analysis and verification of TLS 1.3: 0RTT, resumption and delayed authentication[C] Proc of the 2016 IEEE Symp on Security and Privacy (SP). Piscataway, NJ: IEEE, 2016: 470485[4]Lipner S B. The birth and death of the orange book[J]. IEEE Annals of the History of Computing, 2015, 37(2): 1931[5]Delaune S, Kremer S, Steel G. Formal security analysis of PKCS#11 and proprietary extensions[J]. Journal of Computer Security, 2010, 18(6): 12111245[6]Bertot Y, Castéran P. Interactive Theorem Proving and Program Development: Coq’Art: the Calculus of Inductive Constructions[M]. Berlin: Springer, 2013[7]Xiong Yan, Su Cheng, Huang Wenchao, et al. SmartVerif: Push the limit of automation capability of verifying security protocols by dynamic strategies[C] Proc of the 29th USENIX Security Symposium (USENIX Security 20). Berkeley, CA: USENIX Association, 2020: 253270[8]Armando A, Basin D, Boichut Y, et al. The AVISPA tool for the automated validation of internet security protocols and applications[C] Proc of the 17th Int Conf on Computer Aided Verification. Berlin: Springer, 2005: 281285[9]Blanchet B, Abadi M, Fournet C. Automated verification of selected equivalences for security protocols[J]. The Journal of Logic and Algebraic Programming, 2008, 75(1): 351[10]Dolve D, Yao A. On the security of public key protocols[J]. IEEE Trans on Information Theory, 1983, 29(2): 198208[11]Cas C, Jannik D, Robert K, et al. The tamarin manual[EBOL]. [20241029]. https:tamarinprover.github.io[12]王炯涵, 黄文超, 汪万森, 等. 一种比特币支付协议的形式化建模验证方法[J]. 信息安全研究, 2024, 10(4): 311317[13]He Leifeng, Liu Guanjun. Petri net based CTL model checking: Using a new method to construct OBDD variable order[C] Proc of the 2021 Int Symp on Theoretical Aspects of Software Engineering (TASE). Piscataway, NJ: IEEE, 2021: 159166[14]Esparza J, Heljanko K. Unfoldings: A Partialorder Approach to Model Checking[M]. Berlin: Springer, 2008[15]杨锦翔, 熊焰, 黄文超. 基于强化学习的安全协议形式化验证优化研究[J]. 计算机工程, 2021, 47(12): 141146 |