YoVDO

Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents

Offered By: IEEE via YouTube

Tags

IEEE Symposium on Security and Privacy Courses Cybersecurity Courses Finite State Machine Courses

Course Description

Overview

Learn about an innovative approach to network security in this 18-minute IEEE conference talk. Explore how researchers from Purdue University and Northeastern University are developing automated attack synthesis techniques by extracting finite state machines from protocol specification documents. Discover the potential implications of this method for identifying vulnerabilities in network protocols and enhancing overall cybersecurity measures.

Syllabus

Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Sensor Security
IEEE via YouTube
Tracking Ransomware End-to-end
IEEE via YouTube
Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation
IEEE via YouTube
Algorithmic Transparency via Quantitative Input Influence - Theory and Experiments with Learning Systems
IEEE via YouTube
Bitcoin Over Tor Isn't a Good Idea
IEEE via YouTube