ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2004.01220
  4. Cited By
Automated Attacker Synthesis for Distributed Protocols
v1v2v3v4 (latest)

Automated Attacker Synthesis for Distributed Protocols

2 April 2020
Max von Hippel
Cole Vick
S. Tripakis
Cristina Nita-Rotaru
    AAML
ArXiv (abs)PDFHTML

Papers citing "Automated Attacker Synthesis for Distributed Protocols"

6 / 6 papers shown
Title
Automatic State Machine Inference for Binary Protocol Reverse
  Engineering
Automatic State Machine Inference for Binary Protocol Reverse Engineering
Junhai Yang
Fenghua Li
Yixuan Zhang
Junhao Zhang
Liang Fang
Yunchuan Guo
91
0
0
03 Dec 2024
Payout Races and Congested Channels: A Formal Analysis of Security in
  the Lightning Network
Payout Races and Congested Channels: A Formal Analysis of Security in the Lightning Network
Ben Weintraub
Satwik Prabhu Kumble
Cristina Nita-Rotaru
Stefanie Roos
54
4
0
03 May 2024
A Formal Analysis of SCTP: Attack Synthesis and Patch Verification
A Formal Analysis of SCTP: Attack Synthesis and Patch Verification
Jacob Ginesin
Max von Hippel
Evan Defloor
Cristina Nita-Rotaru
Michael Tüxen
44
0
0
08 Mar 2024
Formal Model-Driven Analysis of Resilience of GossipSub to Attacks from
  Misbehaving Peers
Formal Model-Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers
Ankit Kumar
Max von Hippel
Pete Manolios
Cristina Nita-Rotaru
62
5
0
10 Dec 2022
Automated Attack Synthesis by Extracting Finite State Machines from
  Protocol Specification Documents
Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents
Maria Leonor Pacheco
Max von Hippel
Ben Weintraub
Dan Goldwasser
Cristina Nita-Rotaru
71
32
0
18 Feb 2022
Synthesis of Winning Attacks on Communication Protocols using
  Supervisory Control Theory: Two Case Studies
Synthesis of Winning Attacks on Communication Protocols using Supervisory Control Theory: Two Case Studies
Shoma Matsui
S. Lafortune
AAML
13
6
0
09 Feb 2021
1