{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:43:04Z","timestamp":1773247384245,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["390781972"],"award-info":[{"award-number":["390781972"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["16KIS1557"],"award-info":[{"award-number":["16KIS1557"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3765208","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:33:16Z","timestamp":1763854396000},"page":"246-260","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Finding SSH Strict Key Exchange Violations by State Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-5569-6625","authenticated-orcid":false,"given":"Fabian","family":"B\u00e4umer","sequence":"first","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8964-826X","authenticated-orcid":false,"given":"Marcel","family":"Maehren","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5649-6357","authenticated-orcid":false,"given":"Marcus","family":"Brinkmann","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9315-7354","authenticated-orcid":false,"given":"J\u00f6rg","family":"Schwenk","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.5"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2505.12690"},{"key":"e_1_3_2_2_3_1","volume-title":"Learning regular sets from queries and counterexamples. Information and computation","author":"Angluin Dana","year":"1987","unstructured":"Dana Angluin. 1987. Learning regular sets from queries and counterexamples. Information and computation, Vol. 75, 2 (1987), 87-106."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978383"},{"key":"e_1_3_2_2_5_1","volume-title":"Proceedings of Cybersecurity Artifacts Competition and Impact Award (ACSAC '24)","author":"B\u00e4umer Fabian","year":"2024","unstructured":"Fabian B\u00e4umer, Marcus Brinkmann, Nurullah Erinola, Sven Hebrok, Nico Heitmann, Felix Lange, Marcel Maehren, Robert Merget, Niklas Niere, Maximilian Radoy, Conrad Schmidt, J\u00f6rg Schwenk, and Juraj Somorovsky. 2024b. TLS-Attacker: A Dynamic Framework for Analyzing TLS Implementations. In Proceedings of Cybersecurity Artifacts Competition and Impact Award (ACSAC '24) (Hawaii). ACM. https:\/\/www.acsac.org\/2024\/program\/artifacts_competition\/"},{"key":"e_1_3_2_2_6_1","volume-title":"Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation. In USENIX Security","author":"B\u00e4umer Fabian","year":"2024","unstructured":"Fabian B\u00e4umer, Marcus Brinkmann, and J\u00f6rg Schwenk. 2024a. Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation. In USENIX Security 2024, Davide Balzarotti and Wenyuan Xu (Eds.). USENIX Association, Philadelphia, PA, USA. https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/b%C3%A4umer"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586112"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660286"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23418"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","unstructured":"Denis Bider. 2018. Extension Negotiation in the Secure Shell (SSH) Protocol. RFC 8308. https:\/\/doi.org\/10.17487\/RFC8308","DOI":"10.17487\/RFC8308"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3469133"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00009"},{"key":"e_1_3_2_2_13_1","volume-title":"A Tale of the OpenSSL State Machine: A Large-Scale Black-Box Analysis","author":"de Ruiter Joeri","unstructured":"Joeri de Ruiter. 2016. A Tale of the OpenSSL State Machine: A Large-Scale Black-Box Analysis. In Secure IT Systems, Billy Bob Brumley and Juha R\u00f6ning (Eds.). Springer International Publishing, Cham, 169-184."},{"key":"e_1_3_2_2_14_1","volume-title":"USENIX Security","author":"de Ruiter Joeri","year":"2015","unstructured":"Joeri de Ruiter and Erik Poll. 2015. Protocol State Fuzzing of TLS Implementations. In USENIX Security 2015, Jaeyeon Jung and Thorsten Holz (Eds.). USENIX Association, Washington, DC, USA, 193-206. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/de-ruiter"},{"key":"e_1_3_2_2_15_1","first-page":"5287","volume-title":"34th USENIX Security Symposium (USENIX Security 25)","author":"Dong Yilu","year":"2025","unstructured":"Yilu Dong, Tianchang Yang, Abdullah Al Ishtiaq, Syed Md Mukit Rashid, Ali Ranjbar, Kai Tu, Tianwei Wu, Md Sultan Mahmud, and Syed Rafiul Hussain. 2025. CoreCrisis: Threat-Guided and Context-Aware Iterative Learning and Fuzzing of 5G Core Networks. In 34th USENIX Security Symposium (USENIX Security 25). 5287-5306."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472938"},{"key":"e_1_3_2_2_17_1","volume-title":"USENIX Security","author":"Fiterau-Brostean Paul","year":"2020","unstructured":"Paul Fiterau-Brostean, Bengt Jonsson, Robert Merget, Joeri de Ruiter, Konstantinos Sagonas, and Juraj Somorovsky. 2020. Analysis of DTLS Implementations Using Protocol State Fuzzing. In USENIX Security 2020, Srdjan Capkun and Franziska Roesner (Eds.). USENIX Association, 2523-2540. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/fiterau-brostean"},{"key":"e_1_3_2_2_18_1","volume-title":"Automata-Based Automated Detection of State Machine Bugs in Protocol Implementations. In NDSS","author":"Fiterau-Brostean Paul","year":"2023","unstructured":"Paul Fiterau-Brostean, Bengt Jonsson, Konstantinos Sagonas, and Fredrik Tr aquist. 2023. Automata-Based Automated Detection of State Machine Bugs in Protocol Implementations. In NDSS 2023. The Internet Society, San Diego, CA, USA."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092282.3092289"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","unstructured":"Martin Forssen and Frank Cusack. 2006. Generic Message Exchange Authentication for the Secure Shell Protocol (SSH). RFC 4256. https:\/\/doi.org\/10.17487\/RFC4256","DOI":"10.17487\/RFC4256"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC4419"},{"key":"e_1_3_2_2_22_1","first-page":"911","volume-title":"2020 USENIX Annual Technical Conference (USENIX ATC 20)","author":"Garbelini Matheus E.","year":"2020","unstructured":"Matheus E. Garbelini, Chundong Wang, Sudipta Chattopadhyay, Sun Sumei, and Ernest Kurniawan. 2020. SweynTooth: Unleashing Mayhem over Bluetooth Low Energy. In 2020 USENIX Annual Technical Conference (USENIX ATC 20). USENIX Association, 911-925. https:\/\/www.usenix.org\/conference\/atc20\/presentation\/garbelini"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2956062"},{"key":"e_1_3_2_2_24_1","unstructured":"Torben Brandt Hansen. 2020. Cryptographic Security of SSH Encryption Schemes. PhD thesis. University of London."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","unstructured":"Ben Harris. 2006. RSA Key Exchange for the Secure Shell (SSH) Transport Layer Protocol. RFC 4432. https:\/\/doi.org\/10.17487\/RFC4432","DOI":"10.17487\/RFC4432"},{"key":"e_1_3_2_2_26_1","volume-title":"USENIX Security","author":"Heninger Nadia","year":"2012","unstructured":"Nadia Heninger, Zakir Durumeric, Eric Wustrow, and J. Alex Halderman. 2012. Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices. In USENIX Security 2012, Tadayoshi Kohno (Ed.). USENIX Association, Bellevue, WA, USA, 205-220. https:\/\/www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/heninger"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485388"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","unstructured":"Kevin Igoe and Jerome Solinas. 2009. AES Galois Counter Mode for the Secure Shell Transport Layer Protocol. RFC 5647. https:\/\/doi.org\/10.17487\/RFC5647","DOI":"10.17487\/RFC5647"},{"key":"e_1_3_2_2_29_1","volume-title":"The TTT Algorithm: A Redundancy-Free Approach to Active Automata Learning","author":"Isberner Malte","unstructured":"Malte Isberner, Falk Howar, and Bernhard Steffen. 2014. The TTT Algorithm: A Redundancy-Free Approach to Active Automata Learning. In Runtime Verification, Borzoo Bonakdarpour and Scott A. Smolka (Eds.). Springer International Publishing, Cham, 307-322."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21690-4_32"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179330"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.533956"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC4250"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC4252"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC4254"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC4251"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC4253"},{"key":"e_1_3_2_2_38_1","first-page":"7097","volume-title":"Towards Internet-Based State Learning of TLS State Machines. In 34th USENIX Security Symposium (USENIX Security 25)","author":"Maehren Marcel","year":"2025","unstructured":"Marcel Maehren, Nurullah Erinola, Robert Merget, J\u00f6rg Schwenk, and Juraj Somorovsky. 2025. Towards Internet-Based State Learning of TLS State Machines. In 34th USENIX Security Symposium (USENIX Security 25). 7097-7116."},{"key":"e_1_3_2_2_39_1","unstructured":"Damien Miller. 2025. SSH Strict KEX extension. Internet-Draft draft-ietf-sshm-strict-kex-00. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/draft-ietf-sshm-strict-kex\/00\/ Work in Progress."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"crossref","unstructured":"Damien Miller Markus Friedl Mike Frysinger Todd C. Miller and Darren Tucker. 2024. This documents OpenSSH's deviations and extensions to the published SSH protocol. https:\/\/cvsweb.openbsd.org\/cgi-bin\/cvsweb\/src\/usr.bin\/ssh\/PROTOCOL?rev=1.55 Accessed: 2025-04-14.","DOI":"10.1177\/23320249241265240"},{"key":"e_1_3_2_2_41_1","first-page":"699","volume-title":"Alembic: Automated Model Inference for Stateful Network Functions. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19)","author":"Moon Soo-Jin","year":"2019","unstructured":"Soo-Jin Moon, Jeffrey Helt, Yifei Yuan, Yves Bieri, Sujata Banerjee, Vyas Sekar, Wenfei Wu, Mihalis Yannakakis, and Ying Zhang. 2019. Alembic: Automated Model Inference for Stateful Network Functions. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19). USENIX Association, Boston, MA, 699-718. https:\/\/www.usenix.org\/conference\/nsdi19\/presentation\/moon"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_18"},{"key":"e_1_3_2_2_43_1","volume-title":"Aichernig","author":"Pferscher Andrea","year":"2021","unstructured":"Andrea Pferscher and Bernhard K. Aichernig. 2021. Fingerprinting Bluetooth Low Energy Devices via Active Automata Learning. In Formal Methods, Marieke Huisman, Corina P\u0103s\u0103reanu, and Naijun Zhan (Eds.). Springer International Publishing, Cham, 524-542."},{"key":"e_1_3_2_2_44_1","volume-title":"Aichernig","author":"Pferscher Andrea","year":"2022","unstructured":"Andrea Pferscher and Bernhard K. Aichernig. 2022. Stateful Black-Box Fuzzing of\u00a0Bluetooth Devices Using Automata Learning. In NASA Formal Methods, Jyotirmoy V. Deshmukh, Klaus Havelund, and Ivan Perez (Eds.). Springer International Publishing, Cham, 373-392."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690312"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17143-7_31"},{"key":"e_1_3_2_2_47_1","volume-title":"State machine inference of QUIC. CoRR","author":"Rasool Abdullah","year":"2019","unstructured":"Abdullah Rasool, Greg Alp\u00e1r, and Joeri de Ruiter. 2019. State machine inference of QUIC. CoRR, Vol. abs\/1903.04384 (2019). arXiv:1903.04384 http:\/\/arxiv.org\/abs\/1903.04384"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","unstructured":"Phillip Remaker and Joseph Galbraith. 2006. The Secure Shell (SSH) Session Channel Break Extension. RFC 4335. https:\/\/doi.org\/10.17487\/RFC4335","DOI":"10.17487\/RFC4335"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","unstructured":"Eric Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446. https:\/\/doi.org\/10.17487\/RFC8446","DOI":"10.17487\/RFC8446"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.46"},{"key":"e_1_3_2_2_51_1","volume-title":"Jansen","author":"Smeenk Wouter","year":"2015","unstructured":"Wouter Smeenk, Joshua Moerman, Frits Vaandrager, and David N. Jansen. 2015. Applying Automata Learning to Embedded Control Software. In Formal Methods and Software Engineering, Michael Butler, Sylvain Conchon, and Fatiha Za\u00efdi (Eds.). Springer International Publishing, Cham, 67-83."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978411"},{"key":"e_1_3_2_2_53_1","volume-title":"USENIX Security","author":"Song Dawn Xiaodong","year":"2001","unstructured":"Dawn Xiaodong Song, David A. Wagner, and Xuqing Tian. 2001. Timing Analysis of Keystrokes and Timing Attacks on SSH. In USENIX Security 2001, Dan S. Wallach (Ed.). USENIX Association, Washington, DC, USA. http:\/\/www.usenix.org\/publications\/library\/proceedings\/sec01\/song.html"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","unstructured":"Douglas Stebila and Jonathan Green. 2009. Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer. RFC 5656. https:\/\/doi.org\/10.17487\/RFC5656","DOI":"10.17487\/RFC5656"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99073-6_16"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559365"},{"key":"e_1_3_2_2_57_1","volume-title":"Automatic modeling of SSH implementations with state machine learning algorithms. Bachelor's thesis","author":"Tijssen Max","unstructured":"Max Tijssen. 2014. Automatic modeling of SSH implementations with state machine learning algorithms. Bachelor's thesis, Radboud University Nijmegen. Supervised by Erik Poll and Joeri de Ruiter."},{"key":"e_1_3_2_2_58_1","volume-title":"Syed Md. Mukit Rashid, Yilu Dong, Weixuan Wang, Tianwei Wu, and Syed Rafiul Hussain.","author":"Tu Kai","year":"2024","unstructured":"Kai Tu, Abdullah Al Ishtiaq, Syed Md. Mukit Rashid, Yilu Dong, Weixuan Wang, Tianwei Wu, and Syed Rafiul Hussain. 2024. Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G Basebands. In USENIX Security 2024, Davide Balzarotti and Wenyuan Xu (Eds.). USENIX Association, Philadelphia, PA, USA. https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/tu"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25516-8_22"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-5826-5_27"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-5826-5_27"}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765208","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:17:04Z","timestamp":1766441824000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3765208"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":61,"alternative-id":["10.1145\/3719027.3765208","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3765208","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}