REFERENCES
Anderson, R., Bond, M., Clulow, J., and Skorobogatov, S.
(2006). Cryptographic processors-a survey. Proceed-
ings of the IEEE, 94(2):357–369.
Barany, G. and Signoles, J. (2017). Hybrid information flow
analysis for real-world C code. In Tests and Proofs
- 11th International Conference, TAP 2017, Held as
Part of STAF 2017, Marburg, Germany, July 19-20,
2017, Proceedings, pages 23–40.
Bauer, A. and Jürjens, J. (2010). Runtime verification
of cryptographic protocols. Computers & Security,
29(3):315–330.
Bohli, J., Vasco, M. I. G., and Steinwandt, R. (2007). Se-
cure group key establishment revisited. Int. J. Inf. Sec.,
6(4):243–254.
Bollo, M., Carelli, A., Di Carlo, S., and Prinetto, P. (2017).
Side-channel analysis of secube
TM
platform. In 2017
IEEE East-West Design & Test Symposium (EWDTS),
pages 1–5. IEEE.
Colin, S. and Mariani, L. (2004). Run-time verification.
In Model-Based Testing of Reactive Systems, volume
3472 of Lecture Notes in Computer Science, pages
525–555.
Colombo, C., Pace, G. J., Camilleri, L., Dimech, C., Far-
rugia, R. A., Grech, J., Magro, A., Sammut, A. C.,
and Adami, K. Z. (2016). Runtime verification for
stream processing applications. In Leveraging Ap-
plications of Formal Methods, Verification and Val-
idation: Discussion, Dissemination, Applications -
7th International Symposium, ISoLA 2016, Imperial,
Corfu, Greece, October 10-14, 2016, Proceedings,
Part II, pages 400–406.
Colombo, C., Pace, G. J., and Schneider, G. (2009). LARVA
— safer monitoring of real-time java programs (tool
paper). In Seventh IEEE International Conference on
Software Engineering and Formal Methods (SEFM),
pages 33–37. IEEE Computer Society.
Cooijmans, T., de Ruiter, J., and Poll, E. (2014). Analysis
of secure key storage solutions on android. In Pro-
ceedings of the 4th ACM Workshop on Security and
Privacy in Smartphones & Mobile Devices, pages 11–
20. ACM.
Gorantla, M. C., Boyd, C., Nieto, J. M. G., and Manulis,
M. (2011). Modeling key compromise impersonation
attacks on group key exchange protocols. ACM Trans.
Inf. Syst. Secur., 14(4):28:1–28:24.
Jee, K., Portokalidis, G., Kemerlis, V. P., Ghosh, S., August,
D. I., and Keromytis, A. D. (2012). A general ap-
proach for efficiently accelerating software-based dy-
namic data flow tracking on commodity hardware. In
NDSS.
Leucker, M. and Schallhart, C. (2009). A brief account of
runtime verification. The Journal of Logic and Alge-
braic Programming, 78(5):293 – 303.
Manulis, M. (2007). Provably Secure Group Key Ex-
change, volume 5 of IT Security. Europäischer Uni-
versitätsverlag, Berlin, Bochum, Dülmen, London,
Paris.
McCune, J. M., Li, Y., Qu, N., Zhou, Z., Datta, A.,
Gligor, V., and Perrig, A. (2010). TrustVisor: Effi-
cient TCB reduction and attestation. In Security and
Privacy (SP), 2010 IEEE Symposium on, pages 143–
158. IEEE.
Miller, V. S. (1985). Use of elliptic curves in cryptogra-
phy. In Conference on the theory and application of
cryptographic techniques, pages 417–426. Springer.
Pirker, M., Toegl, R., and Gissing, M. (2010). Dynamic en-
forcement of platform integrity. In International Con-
ference on Trust and Trustworthy Computing, pages
265–272. Springer.
Pnueli, A. (1977). The temporal logic of programs. In Foun-
dations of Computer Science (FOCS), pages 46–57.
IEEE.
Sabt, M., Achemlal, M., and Bouabdallah, A. (2015).
Trusted execution environment: what it is, and what
it is not. In 14th IEEE International Conference on
Trust, Security and Privacy in Computing and Com-
munications.
Schwartz, E. J., Avgerinos, T., and Brumley, D. (2010). All
you ever wanted to know about dynamic taint anal-
ysis and forward symbolic execution (but might have
been afraid to ask). In Security and privacy (SP), 2010
IEEE symposium on, pages 317–331. IEEE.
Sekar, R. (2009). An efficient black-box technique for de-
feating web application attacks. In NDSS.
Selyunin, K., Jaksic, S., Nguyen, T., Reidl, C., Hafner, U.,
Bartocci, E., Nickovic, D., and Grosu, R. (2017). Run-
time monitoring with recovery of the SENT commu-
nication protocol. In Computer Aided Verification -
29th International Conference, CAV, pages 336–355.
Shi, J., Lahiri, S., Chandra, R., and Challen, G. (2018).
Verifi: Model-driven runtime verification frame-
work for wireless protocol implementations. CoRR,
abs/1808.03406.
Signoles, J., Kosmatov, N., and Vorobyov, K. (2017). E-
acsl, a runtime verification tool for safety and secu-
rity of C programs (tool paper). In RV-CuBES 2017.
An International Workshop on Competitions, Usabil-
ity, Benchmarks, Evaluation, and Standardisation for
Runtime Verification Tools, September 15, 2017, Seat-
tle, WA, USA, pages 164–173.
Steinwandt, R. and Corona, A. S. (2010). Attribute-based
group key establishment. Adv. in Math. of Comm.,
4(3):381–398.
Stumpf, F., Tafreschi, O., Röder, P., Eckert, C., et al. (2006).
A robust integrity reporting protocol for remote attes-
tation. In Second Workshop on Advances in Trusted
Computing (WATC’06 Fall), pages 25–36. Citeseer.
Vasco, M. I. G., del Pozo, A. L. P., and Corona, A. S.
(2018). Group key exchange protocols withstand-
ing ephemeral-key reveals. IET Information Security,
12(1):79–86.
Winter, J. (2008). Trusted computing building blocks for
embedded linux-based ARM trustzone platforms. In
Proceedings of the 3rd ACM workshop on Scalable
trusted computing, pages 21–30. ACM.
Zhang, X., Feng, W., Wang, J., and Wang, Z. (2016). De-
fensing the malicious attacks of vehicular network in
runtime verification perspective. In 2016 IEEE In-
ternational Conference on Electronic Information and
Communication Technology (ICEICT), pages 126–
133.
ForSE 2020 - 4th International Workshop on FORmal methods for Security Engineering
774