{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:29:42Z","timestamp":1766449782318,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031171420"},{"type":"electronic","value":"9783031171437"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-17143-7_31","type":"book-chapter","created":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T04:04:22Z","timestamp":1663905862000},"page":"637-657","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Towards a\u00a0Systematic and\u00a0Automatic Use of\u00a0State Machine Inference to\u00a0Uncover Security Flaws and\u00a0Fingerprint TLS Stacks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6253-9341","authenticated-orcid":false,"given":"Aina Toky","family":"Rasoamanana","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0558-5015","authenticated-orcid":false,"given":"Olivier","family":"Levillain","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1344-4167","authenticated-orcid":false,"given":"Herv\u00e9","family":"Debar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,24]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Adrian, D., et al.: Imperfect forward secrecy: how Diffie-Hellman fails in practice. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 5\u201317 (2015)","DOI":"10.1145\/2810103.2813707"},{"issue":"2","key":"31_CR2","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/0890-5401(87)90052-6","volume":"75","author":"D Angluin","year":"1987","unstructured":"Angluin, D.: Learning regular sets from queries and counterexamples. Inf. Comput. 75(2), 87\u2013106 (1987)","journal-title":"Inf. Comput."},{"key":"31_CR3","unstructured":"Aviram, N., et al.: DROWN: breaking TLS with SSLv2. In: 25th USENIX Security Symposium (2016)"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Beurdouche, B., et al.: A messy state of the union: taming the composite state machines of TLS. In: IEEE Symposium on Security and Privacy, SP, pp. 535\u2013552 (2015)","DOI":"10.1109\/SP.2015.39"},{"key":"31_CR5","unstructured":"Biondi, P.: Packet generation and network based attacks with Scapy. In: CanSecWest Applied Security Conference (2005)"},{"key":"31_CR6","unstructured":"B\u00f6ck, H., Somorovsky, J., Young, C.: Return of Bleichenbacher\u2019s oracle threat (ROBOT). In: 27th USENIX Security Symposium, pp. 817\u2013849 (2018)"},{"key":"31_CR7","unstructured":"Bossert, G.: Exploiting semantic for the automatic reverse engineering of communication protocols. Ph.D. thesis, MATISSE (2014)"},{"key":"31_CR8","unstructured":"Bossert, G.: Comparison and attacks against HTTP2. In: Symposium sur la S\u00e9curit\u00e9 des Technologies de l\u2019Information et de la Communication (2016)"},{"issue":"3","key":"31_CR9","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1109\/TSE.1978.231496","volume":"4","author":"TS Chow","year":"1978","unstructured":"Chow, T.S.: Testing software design modeled by finite-state machines. IEEE Trans. Softw. Eng. 4(3), 178\u2013187 (1978)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Durumeric, Z., et al.: The security impact of HTTPS interception. In: 24th Annual Network and Distributed System Security Symposium, NDSS (2017)","DOI":"10.14722\/ndss.2017.23456"},{"key":"31_CR11","unstructured":"Fiterau-Brostean, P., Jonsson, B., Merget, R., de Ruiter, J., Sagonas, K., Somorovsky, J.: Analysis of DTLS implementations using protocol state fuzzing. In: 29th USENIX Security Symposium, pp. 2523\u20132540 (2020)"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Fiterau-Brostean, P., Lenaerts, T., Poll, E., de Ruiter, J., Vaandrager, F.W., Verleg, P.: Model learning and model checking of SSH implementations. In: Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, pp. 142\u2013151 (2017)","DOI":"10.1145\/3092282.3092289"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"Frolov, S., Wustrow, E.: The use of TLS in censorship circumvention. In: 26th Annual Network and Distributed System Security Symposium, NDSS (2019)","DOI":"10.14722\/ndss.2019.23511"},{"issue":"6","key":"31_CR14","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1109\/32.87284","volume":"17","author":"S Fujiwara","year":"1991","unstructured":"Fujiwara, S., von Bochmann, G., Khendek, F., Amalou, M., Ghedamsi, A.: Test selection based on finite state models. IEEE Trans. Softw. Eng. 17(6), 591\u2013603 (1991)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"31_CR15","unstructured":"Henrix, M., Tretmans, J., Jansen, D., Vaandrager, F.: Performance improvement in automata learning. Master\u2019s thesis. Radboud University (2018)"},{"issue":"1","key":"31_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13635-016-0030-7","volume":"2016","author":"M Hus\u00e1k","year":"2016","unstructured":"Hus\u00e1k, M., \u010cerm\u00e1k, M., Jirs\u00edk, T., \u010celeda, P.: HTTPS traffic analysis and client identification using passive SSL\/TLS fingerprinting. EURASIP J. Inf. Secur. 2016(1), 1\u201314 (2016). https:\/\/doi.org\/10.1186\/s13635-016-0030-7","journal-title":"EURASIP J. Inf. Secur."},{"key":"31_CR17","unstructured":"Janssen, E., Vaandrager, F., de Ruiter, J., Poll, E.: Fingerprinting TLS implementations using model learning. Master\u2019s thesis. Radboud University (2021)"},{"key":"31_CR18","unstructured":"Kikuchi, M.: How I discovered CCS injection vulnerability (CVE-2014-0224) (2014). http:\/\/ccsinjection.lepidum.co.jp\/blog\/2014-06-05\/CCS-Injection-en\/index.html"},{"key":"31_CR19","doi-asserted-by":"crossref","unstructured":"Kotzias, P., Razaghpanah, A., Amann, J., Paterson, K.G., Vallina-Rodriguez, N., Caballero, J.: Coming of age: a longitudinal study of TLS deployment. In: Proceedings of the Internet Measurement Conference, IMC, pp. 415\u2013428 (2018)","DOI":"10.1145\/3278532.3278568"},{"key":"31_CR20","unstructured":"L\u00e1zl\u00f3, L.: Random walks on graphs: a survey, combinatorics, Paul Erdos is eighty. Bolyai Soc. Math. Stud. 2 (1993)"},{"key":"31_CR21","unstructured":"Radhakrishna, A., et al.: DroidStar: callback typestates for Android classes. In: Proceedings of the 40th International Conference on Software Engineering, ICSE 2018, Gothenburg, Sweden, 27 May\u201303 June 2018, pp. 1160\u20131170 (2018)"},{"key":"31_CR22","unstructured":"Rasool, A., Alp\u00e1r, G., de Ruiter, J.: State machine inference of QUIC. CoRR abs\/1903.04384 (2019)"},{"key":"31_CR23","doi-asserted-by":"crossref","unstructured":"Rescorla, E.: The transport layer security (TLS) protocol version 1.3. RFC 8446 (Proposed Standard) (2018)","DOI":"10.17487\/RFC8446"},{"key":"31_CR24","unstructured":"de Ruiter, J., Poll, E.: Protocol state fuzzing of TLS implementations. In: 24th USENIX Security Symposium, pp. 193\u2013206 (2015)"},{"key":"31_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-642-05089-3_14","volume-title":"FM 2009: Formal Methods","author":"M Shahbaz","year":"2009","unstructured":"Shahbaz, M., Groz, R.: Inferring Mealy machines. In: Cavalcanti, A., Dams, D.R. (eds.) FM 2009. LNCS, vol. 5850, pp. 207\u2013222. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-05089-3_14"},{"issue":"11","key":"31_CR26","doi-asserted-by":"publisher","first-page":"1813","DOI":"10.1109\/TPDS.2011.26","volume":"22","author":"G Shu","year":"2011","unstructured":"Shu, G., Lee, D.: A formal methodology for network protocol fingerprinting. IEEE Trans. Parallel Distrib. Syst. 22(11), 1813\u20131825 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"31_CR27","doi-asserted-by":"crossref","unstructured":"Somorovsky, J.: Systematic fuzzing and testing of TLS libraries. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. pp. 1492\u20131504 (2016)","DOI":"10.1145\/2976749.2978411"},{"key":"31_CR28","unstructured":"van Thoor, J., de Ruiter, J., Poll, E.: Learning state machines of TLS 1.3 implementations. Bachelor thesis. Radboud University (2018)"},{"key":"31_CR29","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/978-981-13-5826-5_27","volume-title":"Security in Computing and Communications","author":"T Yadav","year":"2019","unstructured":"Yadav, T., Sadhukhan, K.: Identification of bugs and vulnerabilities in TLS implementation for windows operating system using state machine learning. In: Thampi, S.M., Madria, S., Wang, G., Rawat, D.B., Alcaraz Calero, J.M. (eds.) SSCC 2018. CCIS, vol. 969, pp. 348\u2013362. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-5826-5_27"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-17143-7_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T04:10:55Z","timestamp":1663906255000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-17143-7_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031171420","9783031171437"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-17143-7_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2022.compute.dtu.dk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"562","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"104","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}