{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:28:11Z","timestamp":1769747291448,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3690197","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"2741-2755","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["<scp>SpecMon:<\/scp>\n            Modular Black-Box Runtime Monitoring of Security Protocols"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0220-3448","authenticated-orcid":false,"given":"Kevin","family":"Morio","sequence":"first","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Saarland, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0822-9283","authenticated-orcid":false,"given":"Robert","family":"K\u00fcnnemann","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Saarland, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382271"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046745"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516652"},{"key":"e_1_3_2_1_4_1","unstructured":"Omar Alrawi et al. 2024. SoK: An essential guide for using malware sandboxes in security applications: Challenges pitfalls and lessons learned. (2024). arXiv: 2403.16304 [cs.CR]."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00096"},{"key":"e_1_3_2_1_6_1","volume-title":"Sound Verification of Security Protocols: From Design to Interoperable Implementations (extended version). (Dec. 8","author":"Arquint Linard","year":"2022","unstructured":"Linard Arquint, Felix A.Wolf, Joseph Lallemand, Ralf Sasse, Christoph Sprenger, Sven N. Wiesner, David Basin, and Peter Muller. 2022. Sound Verification of Security Protocols: From Design to Interoperable Implementations (extended version). (Dec. 8, 2022). arXiv: 2212.04171 [cs]. preprint."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32759-9_9"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 37th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages","author":"Bhargavan Karthikeyan","unstructured":"Karthikeyan Bhargavan, C\u00e9dric Fournet, and Andrew D. Gordon. 2010. Modular verification of security protocol code by typing. In Proceedings of the 37th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. New York, NY, USA, 445--456."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.14"},{"key":"e_1_3_2_1_10_1","volume-title":"An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In Computer Security Foundations Workshop, 82--96","author":"Blanchet Bruno","year":"2001","unstructured":"Bruno Blanchet. 2001. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In Computer Security Foundations Workshop, 82--96."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-150524"},{"key":"e_1_3_2_1_12_1","volume-title":"DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice. In 2018 IEEE Symposium on Security and Privacy (SP). 2018 IEEE Symposium on Security and Privacy (SP)","author":"Cheval Vincent","year":"2018","unstructured":"Vincent Cheval, Steve Kremer, and Itsaka Rakotonirina. 2018. DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice. In 2018 IEEE Symposium on Security and Privacy (SP). 2018 IEEE Symposium on Security and Privacy (SP). San Francisco, CA, (May 2018), 529--546."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/10722167_15"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Cas Cremers Charlie Jacomme and Philip Lukert. 2023. Subterm-Based Proof Techniques for Improving the Automation and Scope of Security Protocol Analysis. In 2023 IEEE 36th Computer Security Foundations Symposium (CSF). 2023 IEEE 36th Computer Security Foundations Symposium (CSF). (July 2023) 200--213.","DOI":"10.1109\/CSF57540.2023.00001"},{"key":"e_1_3_2_1_15_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Cremers Cas","year":"2020","unstructured":"Cas Cremers, Benjamin Kiesl, and Niklas Medinger. 2020. A Formal Analysis of {IEEE} 802.11?s {WPA2}: Countering the Kracks Caused by Cracking the Counters. In 29th USENIX Security Symposium (USENIX Security 20), 1--17."},{"key":"e_1_3_2_1_16_1","volume-title":"Frida Instrumentation Toolkit","author":"Developers Frida","year":"2024","unstructured":"[SW] Frida Developers, Frida Instrumentation Toolkit 2024. url: https:\/\/frida .re\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53018-4_13"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"D. Dolev and A. Yao. 1983. On the security of public key protocols. IEEE Transactions on Information Theory 2 (Mar. 1983) 198--208.","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_19_1","unstructured":"Jason A Donenfeld and Kevin Milner. 2017. Formal verification of the Wire-Guard protocol. Technical Report Tech. Rep."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23160"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 12th ACM Conference on Computer and Communications Security. CCS05: 12th ACM Conference on Computer and Communications Security 2005","author":"He Changhua","year":"2005","unstructured":"Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, and John C. Mitchell. 2005. A modular correctness proof of IEEE 802.11i and TLS. In Proceedings of the 12th ACM Conference on Computer and Communications Security. CCS05: 12th ACM Conference on Computer and Communications Security 2005. Alexandria VA USA, (Nov. 7, 2005), 2--15."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227231"},{"key":"e_1_3_2_1_23_1","unstructured":"Jan Jurjens. 2008. Using Interface Specifications for Verifying Crypto-protocol Implementations 15."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Nadim Kobeissi Karthikeyan Bhargavan and Bruno Blanchet. 2017. Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach. In 2017 IEEE European Symposium on Security and Privacy (EuroS&P). 2017 IEEE European Symposium on Security and Privacy (EuroS&P). (Apr. 2017) 435--450.","DOI":"10.1109\/EuroSP.2017.38"},{"key":"e_1_3_2_1_25_1","unstructured":"Benjamin Lipp. 2022. Mechanized Cryptographic Proofs of Protocols and their Link with Verified Implementations."},{"key":"e_1_3_2_1_26_1","volume-title":"Computer Aided Verification.","author":"Meier Simon","unstructured":"Simon Meier, Benedikt Schmidt, Cas Cremers, and David Basin. 2013. The TAMARIN Prover for the Symbolic Analysis of Security Protocols. In Computer Aided Verification. Berlin, Heidelberg, 696--701."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2014.26"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Kevin Morio and Robert K\u00fcnnemann. 2024. SpecMon: Modular Black-Box Runtime Monitoring of Security Protocols. Full version. (2024). arXiv: 2409.02918.","DOI":"10.1145\/3658644.3690197"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.12787864"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623090"},{"key":"e_1_3_2_1_31_1","volume-title":"Engineering Secure Software and Systems.","author":"Pironti Alfredo","year":"2012","unstructured":"Alfredo Pironti and Jan J\u00fcrjens. 2010. Formally-based black-box monitoring of security protocols. In Engineering Secure Software and Systems. Berlin, Heidelberg, 79--95. [32] Nadia Polikarpova and Michal Moskal. 2012. Verifying implementations of security protocols by refinement. In Verified Software: Theories, Tools, Experiments. Berlin, Heidelberg, 50--65."},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings 2024 Network and Distributed System Security Symposium. Network and Distributed System Security Symposium","author":"Project SSL","year":"2024","unstructured":"[SW] OpenSSL Project, OpenSSL 2024. url: https:\/\/www.openssl.org\/. [34] Sylvain Ruhault, Pascal Lafourcade, and Dhekra Mahmoud. 2024. A Unified Symbolic Analysis of WireGuard. In Proceedings 2024 Network and Distributed System Security Symposium. Network and Distributed System Security Symposium. San Diego, CA, USA."},{"key":"e_1_3_2_1_33_1","volume-title":"Benjamin Andow, Adwait Nadkarni, Luke Deshotels, Jason Gionta, William Enck, and Xiaohui Gu.","author":"Shu Rui","year":"2017","unstructured":"Rui Shu, Peipei Wang, Sigmund A Gorski Iii, Benjamin Andow, Adwait Nadkarni, Luke Deshotels, Jason Gionta, William Enck, and Xiaohui Gu. 2017. A Study of Security Isolation Techniques. ACM Comput. Surv., 3, (Sept. 30, 2017), 1--37."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428220"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2034773.2034811"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-021-00391-1"},{"key":"e_1_3_2_1_37_1","volume-title":"The Dark Side of 'Black-Box' Cryptography or: ShouldWe Trust Capstone' In Advances in Cryptology ' CRYPTO '96","author":"Young Adam","unstructured":"Adam Young and Moti Yung. 1996. The Dark Side of 'Black-Box' Cryptography or: ShouldWe Trust Capstone' In Advances in Cryptology ' CRYPTO '96. Berlin, Heidelberg, 89--103."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690197","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690197","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:54:42Z","timestamp":1755842082000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690197"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":37,"alternative-id":["10.1145\/3658644.3690197","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3690197","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}