In-depth fuzz testing of IKE implementations

Abstract

The correctness of security protocols can be proved using formal models. Typ-ically, a security protocol is proven correct at a high level of abstraction, hiding away the implementation details. To execute the protocol on a real system, soft-ware engineers take up the task to implement the protocol. Programming is a

    Similar works