• Computer Science
  • Published 2015

Ensuring specification compliance, robustness, and security of wireless network protocols

@inproceedings{Hoque2015EnsuringSC,
  title={Ensuring specification compliance, robustness, and security of wireless network protocols},
  author={Endadul Hoque},
  year={2015}
}
Highlight Information
Hoque, Md. Endadul PhD, Purdue University, December 2015. [...] Key Method First, we propose an automatic compliance checking technique allowing a developer to ensure—before deployment—that the implementation is compliant with the protocol specifications. Second, we develop an automated adversarialExpand Abstract

References

Publications referenced by this paper.
SHOWING 1-10 OF 183 REFERENCES

Fast Poisson disk sampling in arbitrary dimensions

VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Authenticated routing for ad hoc networks

VIEW 26 EXCERPTS
HIGHLY INFLUENTIAL

Full TCP/IP for 8-bit architectures

VIEW 30 EXCERPTS
HIGHLY INFLUENTIAL

Nusmv version 2: an opensource tool for symbolic model checking

VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Securing OLSR problem statement

  • T. Clausen, E. Baccelli
  • https:// tools.ietf.org/html/draft-clausen-manet-solsr-ps-00, 2005. Accessed:
  • 2015
VIEW 19 EXCERPTS
HIGHLY INFLUENTIAL

MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery

VIEW 8 EXCERPTS
HIGHLY INFLUENTIAL