Server-side verification of client behavior in cryptographic protocols


Numerous exploits of client-server protocols and applications involve modifying clients to behave in ways that untampered clients would not, such as crafting malicious packets. In this paper, we demonstrate practical verification of a cryptographic protocol client’s messaging behavior as being consistent with the client program it is believed to be running… (More)


15 Figures and Tables