{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:12:34Z","timestamp":1765887154635,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044434"},{"type":"electronic","value":"9783642044441"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04444-1_24","type":"book-chapter","created":{"date-parts":[[2009,9,14]],"date-time":"2009-09-14T18:34:44Z","timestamp":1252953284000},"page":"390-405","source":"Crossref","is-referenced-by-count":10,"title":["Model-Checking DoS Amplification for VoIP Session Initiation"],"prefix":"10.1007","author":[{"given":"Ravinder","family":"Shankesi","sequence":"first","affiliation":[]},{"given":"Musab","family":"AlTurki","sequence":"additional","affiliation":[]},{"given":"Ralf","family":"Sasse","sequence":"additional","affiliation":[]},{"given":"Carl A.","family":"Gunter","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9","family":"Meseguer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/978-3-540-24725-8_24","volume-title":"Programming Languages and Systems","author":"M. Abadi","year":"2004","unstructured":"Abadi, M., Blanchet, B., Fournet, C.: Just fast keying in the pi calculus. In: Schmidt, D. (ed.) ESOP 2004. LNCS, vol.\u00a02986, pp. 340\u2013354. Springer, Heidelberg (2004)"},{"key":"24_CR2","unstructured":"Agha, G., Gunter, C.A., Greenwald, M., Khanna, S., Meseguer, J., Sen, K., Thati, P.: Formal modeling and analysis of DoS using probabilistic rewrite theories. In: International Workshop on Foundations of Computer Security, FCS 2005 (2005)"},{"issue":"2","key":"24_CR3","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.entcs.2005.10.040","volume":"153","author":"G. Agha","year":"2006","unstructured":"Agha, G., Meseguer, J., Sen, K.: PMaude: Rewrite-based specification language for probabilistic object systems. Electronic Notes in Theoretical Computer Science\u00a0153(2), 213\u2013239 (2006)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"24_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.entcs.2009.02.069","volume":"234","author":"M. AlTurki","year":"2009","unstructured":"AlTurki, M., Meseguer, J., Gunter, C.A.: Probabilistic modeling and analysis of DoS protection for the ASV protocol. Electron. Notes Theor. Comput. Sci.\u00a0234, 3\u201318 (2009)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Chadha, R., Gunter, C.A., Meseguer, J., Shankesi, R., Viswanathan, M.: Modular preservation of safety properties by cookie-based DoS-protection wrappers. In: Formal Methods for Open Object-Based Distributed Systems, pp. 39\u201358 (2008)","DOI":"10.1007\/978-3-540-68863-1_4"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","volume-title":"All About Maude - A High-Performance Logical Framework: How to Specify, Program, and Verify Systems in Rewriting Logic","author":"M. Clavel","year":"2007","unstructured":"Clavel, M., Dur\u00e1n, F., Eker, S., Lincoln, P., Mart\u00ed-Oliet, N., Meseguer, J., Talcott, C.: All About Maude - A High-Performance Logical Framework: How to Specify, Program, and Verify Systems in Rewriting Logic. LNCS. Springer, Heidelberg (2007)"},{"key":"24_CR7","unstructured":"Denker, G., Meseguer, J., Talcott, C.L.: Protocol specification and analysis in Maude. In: Proc. of Workshop on Formal Methods and Security Protocols (1998)"},{"issue":"2","key":"24_CR8","doi-asserted-by":"publisher","first-page":"247","DOI":"10.3233\/JCS-2004-12203","volume":"12","author":"N. Durgin","year":"2004","unstructured":"Durgin, N., Lincoln, P., Mitchell, J., Scedrov, A.: Multiset rewriting and the complexity of bounded security protocols. J. Comput. Secur.\u00a012(2), 247\u2013311 (2004)","journal-title":"J. Comput. Secur."},{"issue":"1","key":"24_CR9","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.tcs.2006.08.035","volume":"367","author":"S. Escobar","year":"2006","unstructured":"Escobar, S., Meadows, C., Meseguer, J.: A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties. Theor. Comput. Sci.\u00a0367(1), 162\u2013202 (2006)","journal-title":"Theor. Comput. Sci."},{"key":"24_CR10","unstructured":"Goodloe, A.E.: A Foundation for Tunnel-Complex Protocols. PhD thesis, University of Pennsylvania (2008)"},{"key":"24_CR11","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/CSF.2007.31","volume-title":"20th IEEE Computer Security Foundations Symposium","author":"P. Gupta","year":"2007","unstructured":"Gupta, P., Shmatikov, V.: Security analysis of voice-over-ip protocols. In: 20th IEEE Computer Security Foundations Symposium, Venice, Italy, pp. 49\u201363. IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"24_CR12","unstructured":"IETF. SIP: Session Initiation Protocol. RFC 3261 (Proposed Standard), Updated by RFCs 3265, 3853, 4320, 4916, 5393 (June 2002)"},{"key":"24_CR13","unstructured":"IETF. Addressing an Amplification Vulnerability in Forking Proxies draft-ietf-sip-fork-loop-fix-00. Internet-Draft (February 2006)"},{"key":"24_CR14","unstructured":"IETF. Addressing an Amplification Vulnerability in Session Initiation Protocol (SIP) Forking Proxies. RFC 5393 (Proposed Standard) (December 2008)"},{"key":"24_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-540-72952-5_18","volume-title":"Formal Methods for Open Object-Based Distributed Systems","author":"M.-Y. Kim","year":"2007","unstructured":"Kim, M.-Y., Stehr, M.-O., Talcott, C., Dutt, N., Venkatasubramanian, N.: A probabilistic formal analysis approach to cross layer optimization in distributed embedded systems. In: Bonsangue, M.M., Johnsen, E.B. (eds.) FMOODS 2007. LNCS, vol.\u00a04468, pp. 285\u2013300. Springer, Heidelberg (2007)"},{"issue":"11","key":"24_CR16","first-page":"1350","volume":"9","author":"S. Lafrance","year":"2003","unstructured":"Lafrance, S., Mullins, J.: An information flow method to detect denial of service vulnerabilities. J. UCS\u00a09(11), 1350\u20131369 (2003)","journal-title":"J. UCS"},{"key":"24_CR17","volume-title":"IEEE Computer Security Foundations Workshop, (CSFW-18 2005)","author":"A. Mahimkar","year":"2005","unstructured":"Mahimkar, A., Shmatikov, V.: Game-based analysis of denial-of-service prevention protocols. In: IEEE Computer Security Foundations Workshop (CSFW-18 2005). IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Meadows, C.: A formal framework and evaluation method for network denial of service. In: CSFW, pp. 4\u201313 (1999)","DOI":"10.1109\/CSFW.1999.779758"},{"issue":"1","key":"24_CR19","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/0304-3975(92)90182-F","volume":"96","author":"J. Meseguer","year":"1992","unstructured":"Meseguer, J.: Conditional rewriting logic as a unified model of concurrency. Theor. Comput. Sci.\u00a096(1), 73\u2013155 (1992)","journal-title":"Theor. Comput. Sci."},{"key":"24_CR20","series-title":"IFIP Conference Proceedings","first-page":"89","volume-title":"FMOODS","author":"J. Meseguer","year":"2000","unstructured":"Meseguer, J.: Rewriting logic and maude: a wide-spectrum semantic framework for object-based distributed systems. In: Smith, S.F., Talcott, C.L. (eds.) FMOODS. IFIP Conference Proceedings, vol.\u00a0177, pp. 89\u2013117. Kluwer, Dordrecht (2000)"},{"key":"24_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/11513988_26","volume-title":"Computer Aided Verification","author":"K. Sen","year":"2005","unstructured":"Sen, K., Viswanathan, M., Agha, G.A.: On Statistical Model Checking of Stochastic Systems. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol.\u00a03576, pp. 266\u2013280. Springer, Heidelberg (2005)"},{"key":"24_CR22","first-page":"1","volume-title":"SecureComm 2008: Proceedings of the 4th international conference on Security and privacy in communication netowrks","author":"X. Wang","year":"2008","unstructured":"Wang, X., Zhang, R., Yang, X., Jiang, X., Wijesekera, D.: Voice pharming attack and the trust of VoIP. In: SecureComm 2008: Proceedings of the 4th international conference on Security and privacy in communication netowrks, pp. 1\u201311. ACM Press, New York (2008)"},{"issue":"9","key":"24_CR23","doi-asserted-by":"publisher","first-page":"1368","DOI":"10.1016\/j.ic.2006.05.002","volume":"204","author":"H.L.S. Younes","year":"2006","unstructured":"Younes, H.L.S., Simmons, R.G.: Statistical probabilistic model checking with a focus on time-bounded properties. Inf. Comput.\u00a0204(9), 1368\u20131409 (2006)","journal-title":"Inf. Comput."},{"issue":"6","key":"24_CR24","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1109\/32.55087","volume":"16","author":"C.-F. Yu","year":"1990","unstructured":"Yu, C.-F., Gligor, V.D.: A specification and verification method for preventing denial of service. IEEE Trans. Softw. Eng.\u00a016(6), 581\u2013592 (1990)","journal-title":"IEEE Trans. Softw. Eng."}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2009"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04444-1_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T04:18:21Z","timestamp":1739333901000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04444-1_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044434","9783642044441"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04444-1_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}