{"date_created":"2024-12-17T11:25:14Z","keyword":["SSL","TLS","DTLS","Protocol State Fuzzing","Planning Based"],"citation":{"ieee":"F. Bäumer et al., “TLS-Attacker: A Dynamic Framework for Analyzing TLS Implementations,” presented at the Annual Computer Security Applications Conference, Hawaii, 2024.","chicago":"Bäumer, Fabian, Marcus Brinkmann, Nurullah Erinola, Sven Niclas Hebrok, Nico Heitmann, Felix Lange, Marcel Maehren, et al. “TLS-Attacker: A Dynamic Framework for Analyzing TLS Implementations.” In Proceedings of Cybersecurity Artifacts Competition and Impact Award (ACSAC ’24), 2024.","bibtex":"@inproceedings{Bäumer_Brinkmann_Erinola_Hebrok_Heitmann_Lange_Maehren_Merget_Niere_Radoy_et al._2024, title={TLS-Attacker: A Dynamic Framework for Analyzing TLS Implementations}, booktitle={Proceedings of Cybersecurity Artifacts Competition and Impact Award (ACSAC ’24)}, author={Bäumer, Fabian and Brinkmann, Marcus and Erinola, Nurullah and Hebrok, Sven Niclas and Heitmann, Nico and Lange, Felix and Maehren, Marcel and Merget, Robert and Niere, Niklas and Radoy, Maximilian Manfred and et al.}, year={2024} }","ama":"Bäumer F, Brinkmann M, Erinola N, et al. TLS-Attacker: A Dynamic Framework for Analyzing TLS Implementations. In: Proceedings of Cybersecurity Artifacts Competition and Impact Award (ACSAC ’24). ; 2024.","short":"F. Bäumer, M. Brinkmann, N. Erinola, S.N. Hebrok, N. Heitmann, F. Lange, M. Maehren, R. Merget, N. Niere, M.M. Radoy, C. Schmidt, J. Schwenk, J. Somorovsky, in: Proceedings of Cybersecurity Artifacts Competition and Impact Award (ACSAC ’24), 2024.","mla":"Bäumer, Fabian, et al. “TLS-Attacker: A Dynamic Framework for Analyzing TLS Implementations.” Proceedings of Cybersecurity Artifacts Competition and Impact Award (ACSAC ’24), 2024.","apa":"Bäumer, F., Brinkmann, M., Erinola, N., Hebrok, S. N., Heitmann, N., Lange, F., Maehren, M., Merget, R., Niere, N., Radoy, M. M., Schmidt, C., Schwenk, J., & Somorovsky, J. (2024). TLS-Attacker: A Dynamic Framework for Analyzing TLS Implementations. Proceedings of Cybersecurity Artifacts Competition and Impact Award (ACSAC ’24). Annual Computer Security Applications Conference, Hawaii."},"title":"TLS-Attacker: A Dynamic Framework for Analyzing TLS Implementations","author":[{"full_name":"Bäumer, Fabian","first_name":"Fabian","last_name":"Bäumer"},{"first_name":"Marcus","last_name":"Brinkmann","full_name":"Brinkmann, Marcus"},{"last_name":"Erinola","first_name":"Nurullah","full_name":"Erinola, Nurullah"},{"full_name":"Hebrok, Sven Niclas","id":"55616","orcid":"0009-0006-1172-1665","first_name":"Sven Niclas","last_name":"Hebrok"},{"id":"74619","full_name":"Heitmann, Nico","first_name":"Nico","last_name":"Heitmann"},{"last_name":"Lange","first_name":"Felix","id":"67893","full_name":"Lange, Felix"},{"last_name":"Maehren","first_name":"Marcel","full_name":"Maehren, Marcel"},{"last_name":"Merget","first_name":"Robert","full_name":"Merget, Robert"},{"last_name":"Niere","first_name":"Niklas","full_name":"Niere, Niklas","id":"63563"},{"full_name":"Radoy, Maximilian Manfred","id":"68826","orcid":"0009-0005-3059-6823","last_name":"Radoy","first_name":"Maximilian Manfred"},{"full_name":"Schmidt, Conrad","last_name":"Schmidt","first_name":"Conrad"},{"full_name":"Schwenk, Jörg","last_name":"Schwenk","first_name":"Jörg"},{"last_name":"Somorovsky","first_name":"Juraj","orcid":"0000-0002-3593-7720","full_name":"Somorovsky, Juraj","id":"83504"}],"conference":{"name":"Annual Computer Security Applications Conference","end_date":"2024-12-13","location":"Hawaii","start_date":"2024-12-09"},"year":"2024","type":"conference","user_id":"67893","_id":"57816","language":[{"iso":"eng"}],"date_updated":"2024-12-17T11:30:00Z","abstract":[{"lang":"eng","text":"TLS-Attacker is an open-source framework for analyzing Transport\r\nLayer Security (TLS) implementations. The framework allows users\r\nto specify custom protocol flows and provides modification hooks to\r\nmanipulate message contents. Since its initial publication in 2016 by\r\nJuraj Somorovsky, TLS-Attacker has been used in numerous studies\r\npublished at well-established conferences and helped to identify\r\nvulnerabilities in well-known open-source TLS libraries. To enable\r\nautomated analyses, TLS-Attacker has grown into a suite of projects,\r\neach designed as a building block that can be applied to facilitate\r\nvarious analysis methodologies. The framework still undergoes\r\ncontinuous improvements with feature extensions, such as DTLS\r\n1.3 or the addition of new dialects such as QUIC, to continue its\r\neffectiveness and relevancy as a security analysis framework."}],"quality_controlled":"1","publication":"Proceedings of Cybersecurity Artifacts Competition and Impact Award (ACSAC ’24)","status":"public"}