[BOK][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

{MoonShine}: Optimizing {OS} fuzzer seed selection with trace distillation

S Pailoor, A Aday, S Jana - 27th USENIX Security Symposium (USENIX …, 2018 - usenix.org
OS fuzzers primarily test the system call interface between the OS kernel and user-level
applications for security vulnerabilities. The effectiveness of evolutionary OS fuzzers …