Feb. 24, 2022, 2:20 a.m. | Maria Leonor Pacheco, Max von Hippel, Ben Weintraub, Dan Goldwasser, Cristina Nita-Rotaru

cs.CR updates on arXiv.org arxiv.org

Automated attack discovery techniques, such as attacker synthesis or
model-based fuzzing, provide powerful ways to ensure network protocols operate
correctly and securely. Such techniques, in general, require a formal
representation of the protocol, often in the form of a finite state machine
(FSM). Unfortunately, many protocols are only described in English prose, and
implementing even a simple network protocol as an FSM is time-consuming and
prone to subtle logical errors. Automatically extracting protocol FSMs from
documentation can significantly contribute to …

attack documents finite state machines state

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Consultant

@ Auckland Council | Central Auckland, NZ, 1010

Security Engineer, Threat Detection

@ Stripe | Remote, US

DevSecOps Engineer (Remote in Europe)

@ CloudTalk | Prague, Prague, Czechia - Remote

Security Architect

@ Valeo Foods | Dublin, Ireland

Security Specialist - IoT & OT

@ Wallbox | Barcelona, Catalonia, Spain