Analysis of {DTLS} implementations using protocol state fuzzing

P Fiterau-Brostean, B Jonsson, R Merget… - 29th USENIX Security …, 2020 - usenix.org
Recent years have witnessed an increasing number of protocols relying on UDP. Compared
to TCP, UDP offers performance advantages such as simplicity and lower latency. This has …

AALpy: an active automata learning library

E Muškardin, BK Aichernig, I Pill, A Pferscher… - Innovations in Systems …, 2022 - Springer
AALpy is an extensible open-source Python library providing efficient implementations of
active automata learning algorithms for deterministic, non-deterministic, and stochastic …

Learning interpretable models expressed in linear temporal logic

A Camacho, SA McIlraith - Proceedings of the International Conference on …, 2019 - aaai.org
We examine the problem of learning models that characterize the high-level behavior of a
system based on observation traces. Our aim is to develop models that are human …

A new approach for active automata learning based on apartness

F Vaandrager, B Garhewal, J Rot… - … Conference on Tools and …, 2022 - Springer
We present L#, a new and simple approach to active automata learning. Instead of focusing
on equivalence of observations, like the L∗ algorithm and its descendants, L# takes a …

[PDF][PDF] Automata-Based Automated Detection of State Machine Bugs in Protocol Implementations.

P Fiterau-Brostean, B Jonsson, K Sagonas, F Tåquist - NDSS, 2023 - ndss-symposium.org
Implementations of stateful security protocols must carefully manage the type and order of
exchanged messages and cryptographic material, by maintaining a state machine which …

Noncompliance as deviant behavior: An automated black-box noncompliance checker for 4g lte cellular devices

SR Hussain, I Karim, AA Ishtiaq, O Chowdhury… - Proceedings of the …, 2021 - dl.acm.org
The paper focuses on develo** an automated black-box testing approach called DIKEUE
that checks 4G Long Term Evolution (LTE) control-plane protocol implementations in …

Linear-time temporal logic guided greybox fuzzing

R Meng, Z Dong, J Li, I Beschastnikh… - Proceedings of the 44th …, 2022 - dl.acm.org
Software model checking as well as runtime verification are verification techniques which
are widely used for checking temporal properties of software systems. Even though they are …

{MPInspector}: A systematic and automatic approach for evaluating the security of {IoT} messaging protocols

Q Wang, S Ji, Y Tian, X Zhang, B Zhao, Y Kan… - 30th USENIX Security …, 2021 - usenix.org
Facilitated by messaging protocols (MP), many home devices are connected to the Internet,
bringing convenience and accessibility to customers. However, most deployed MPs on IoT …

Prochecker: An automated security and privacy analysis framework for 4g lte protocol implementations

I Karim, SR Hussain, E Bertino - 2021 IEEE 41st International …, 2021 - ieeexplore.ieee.org
Cellular protocol implementations must comply with the specifications, and the security and
privacy requirements. These implementations, however, often deviate from the security and …

End-to-end learning of ltlf formulae by faithful ltlf encoding

H Wan, P Liang, J Du, W Luo, R Ye… - Proceedings of the AAAI …, 2024 - ojs.aaai.org
A key problem in rule mining is automatically discovering the underlying tree-structured
rules from large amounts of data. In this paper, we examine learning linear temporal logic on …