@inproceedings{57816,
  abstract     = {{TLS-Attacker is an open-source framework for analyzing Transport
Layer Security (TLS) implementations. The framework allows users
to specify custom protocol flows and provides modification hooks to
manipulate message contents. Since its initial publication in 2016 by
Juraj Somorovsky, TLS-Attacker has been used in numerous studies
published at well-established conferences and helped to identify
vulnerabilities in well-known open-source TLS libraries. To enable
automated analyses, TLS-Attacker has grown into a suite of projects,
each designed as a building block that can be applied to facilitate
various analysis methodologies. The framework still undergoes
continuous improvements with feature extensions, such as DTLS
1.3 or the addition of new dialects such as QUIC, to continue its
effectiveness and relevancy as a security analysis framework.}},
  author       = {{Bäumer, Fabian and Brinkmann, Marcus and Erinola, Nurullah and Hebrok, Sven Niclas and Heitmann, Nico and Lange, Felix and Maehren, Marcel and Merget, Robert and Niere, Niklas and Radoy, Maximilian Manfred and Schmidt, Conrad and Schwenk, Jörg and Somorovsky, Juraj}},
  booktitle    = {{Proceedings of Cybersecurity Artifacts Competition and Impact Award (ACSAC ’24)}},
  keywords     = {{SSL, TLS, DTLS, Protocol State Fuzzing, Planning Based}},
  location     = {{Hawaii}},
  title        = {{{TLS-Attacker: A Dynamic Framework for Analyzing TLS Implementations}}},
  year         = {{2024}},
}

