Model learning and model checking of ipsec implementations for internet of things

J Guo, C Gu, X Chen, F Wei - IEEE Access, 2019 - ieeexplore.ieee.org
With the development of Internet of Things (IoT) technology, the demand for secure
communication by smart devices has dramatically increased, and the security of the IoT …

Stateful black-box fuzzing for encryption protocols and its application in IPsec

J Guo, C Gu, X Chen, X Zhang, K Tian, J Li - Computer Networks, 2024 - Elsevier
Owing to the rapid development of information security technology, the security analysis of
encryption protocols has received widespread attention. In this paper, we propose a stateful …

Security analysis of the consumer remote SIM provisioning protocol

AS Ahmed, A Peltonen, M Sethi, T Aura - ACM Transactions on Privacy …, 2024 - dl.acm.org
Remote SIM provisioning (RSP) for consumer devices is the protocol specified by the GSM
Association for downloading SIM profiles into a secure element in a mobile device. The …

A systematic approach to formal analysis of QUIC handshake protocol using symbolic model checking

J Zhang, X Gao, L Yang, T Feng, D Li… - Security and …, 2021 - Wiley Online Library
As a newly proposed secure transport protocol, QUIC aims to improve the transport
performance of HTTPS traffic and enable rapid deployment and evolution of transport …

Automated state-machine-based analysis of hostname verification in ipsec implementations

J Guo, C Gu, X Chen, S Lu, F Wei - Information Technology and Control, 2021 - itc.ktu.lt
Owing to the advent and rapid development of Internet communication technology, network
security protocols with cryptography as their core have gradually become an important …

Verification of Safety and Liveness on Process Management System using Spin Model Checker

M Rashid, I Rasool, NA Zafar… - 2023 18th …, 2023 - ieeexplore.ieee.org
Process management deals with processor mechanisms to execute the processes.
Nowadays an efficient process management algorithm is necessary for the efficient load …

Verification of Safety of Aircraft Arrival Procedure using SPIN Model Checker

M Rashid, M Qadeer, H Raza… - … on Frontiers of …, 2023 - ieeexplore.ieee.org
The volume of air traffic increases dramatically and the air traffic control system is a safety
critical system. Failure of the system can cause loss of human life, cost, and hard work of …

Formal Verification of Aircraft Departure Procedure Using Spin Model Checker

M Rashid, MM ul Rehman, H Raza… - 2023 18th …, 2023 - ieeexplore.ieee.org
The volume of air traffic increase dramatically and safety of air traffic systems are becoming
critical issue day by day. Failure of system can cause loss of human life, cost and hard work …

Formal analysis of the security protocol with timestamp using SPIN

M **ao, W Song, K Yang, R OuYang… - Computational …, 2022 - Wiley Online Library
The verification of security protocols is an important basis for network security. Now, some
security protocols add timestamps to messages to defend against replay attacks by network …

Applying SPIN checker on 5G EAP-TLS authentication protocol analysis

Q Wang - Computer Science and Information Systems, 2024 - doiserbia.nb.rs
Currently, there is relatively little formal analysis and verification work on the 5G EAP-TLS
authentication protocol. In this paper, we use the model checker SPIN to perform a formal …