Cited By
View all- Wilson JAsplund M(2025)Analysing TLS Implementations Using Full-Message Symbolic ExecutionSecure IT Systems10.1007/978-3-031-79007-2_15(283-302)Online publication date: 29-Jan-2025
- Asadian HFiterău-Broştean PJonsson BSagonas K(2024)Testing IoT Protocol Requirements Using Fuzzing and Symbolic Execution: Application to CoAP2024 IEEE Conference on Standards for Communications and Networking (CSCN)10.1109/CSCN63874.2024.10849709(48-54)Online publication date: 25-Nov-2024
- Crochet CAoga JLegay A(2024)Formally Discovering and Reproducing Network Protocols VulnerabilitiesSecure IT Systems10.1007/978-3-031-79007-2_22(424-443)Online publication date: 6-Nov-2024