Reynald Affeldt & Nicolas Marti (2013):
Towards Formal Verification of TLS Network Packet Processing Written in C.
In: PLPV,
doi:10.1145/2428116.2428124.
Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J. Alex Halderman, Viktor Dukhovni, Emilia Käsper, Shaanan Cohney, Susanne Engels, Christof Paar & Yuval Shavitt (2016):
DROWN: Breaking TLS Using SSLv2.
In: Thorsten Holz & Stefan Savage: 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016..
USENIX Association,
pp. 689–706.
Available at https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/aviram.
Manfred Broy, Bengt Jonsson, Joost-Pieter Katoen, Martin Leucker & Alexander Pretschner (2005):
Model-Based Testing of Reactive Systems, Advanced Lectures [The volume is the outcome of a research seminar that was held in Schloss Dagstuhl in January 2004].
Lecture Notes in Computer Science 3472.
Springer,
doi:10.1007/b137241.
Chad Brubaker, Suman Jana, Baishakhi Ray, Sarfraz Khurshid & Vitaly Shmatikov (2014):
Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations.
In: 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014.
IEEE Computer Society,
pp. 114–129,
doi:10.1109/SP.2014.15.
G. Diaz, F. Cuartero, V. Valero & F. Pelayo (2004):
Automatic Verification of the TLS HandShake Protocol.
In: Proceedings of the 19th ACM Symposium on Applied Computing (SAC'04),
doi:10.1145/967900.968063.
Tim Dierks & Eric Rescorla (2006):
The Transport Layer Security (TLS) Protocol Version 1.1.
RFC 4346,
pp. 1–87,
doi:10.17487/RFC4346.
Zakir Durumeric, James Kasten, David Adrian, J. Alex Halderman, Michael Bailey, Frank Li, Nicholas Weaver, Johanna Amann, Jethro Beekman, Mathias Payer & Vern Paxson (2014):
The Matter of Heartbleed.
In: Carey Williamson, Aditya Akella & Nina Taft: Proceedings of the 2014 Internet Measurement Conference, IMC 2014, Vancouver, BC, Canada, November 5-7, 2014.
ACM,
pp. 475–488,
doi:10.1145/2663716.2663755.
Hubert Garavel, Frédéric Lang, Radu Mateescu & Wendelin Serwe (2013):
CADP 2011: a toolbox for the construction and analysis of distributed processes.
STTT 15(2),
pp. 89–107,
doi:10.1007/s10009-012-0244-z.
Hubert Garavel, Frédéric Lang & Wendelin Serwe (2017):
From LOTOS to LNT.
In: ModelEd, TestEd, TrustEd - Essays Dedicated to Ed Brinksma on the Occasion of His 60th Birthday,
pp. 3–26,
doi:10.1007/978-3-319-68270-9_1.
Lina Marsso, Radu Mateescu & Wendelin Serwe:
TESTOR: A Modular Tool for On-the-Fly Conformance Test Case Generation.
To appear at TACAS 2018.
E. Poll, J. de Ruiter & A. Schubert (2015):
Protocol state machines and session languages: specification, implementation, and security flaws.
In: Security and Privacy Workshops (SPW),
doi:10.1109/SPW.2015.32.
D. E. Simos, J. Bozic, F. Duan, B. Garn, K. Kleine, Y. Lei & F. Wotawa (2017):
Testing TLS Using Combinatorial Methods and Execution Framework.
In: Proceedings of the IFIP International Conference on Testing Software and Systems (ICTSS'17),
doi:10.1007/978-3-319-67549-7_10.
Jan Tretmans (1996):
Conformance Testing with Labelled Transition Systems: Implementation Relations and Test Generation.
Computer Networks and ISDN Systems 29(1),
pp. 49–79,
doi:10.1016/S0169-7552(96)00017-7.
Alfred C. Weaver (2006):
Secure Sockets Layer.
IEEE Computer 39(4),
pp. 88–90,
doi:10.1109/MC.2006.138.