{"id":"https://openalex.org/W7084107477","doi":"https://doi.org/10.1109/infocom55648.2025.11044576","title":"Formally Verifying the State Machine of TLS 1.3 Handshake in OpenSSL","display_name":"Formally Verifying the State Machine of TLS 1.3 Handshake in OpenSSL","publication_year":2025,"publication_date":"2025-05-19","ids":{"openalex":"https://openalex.org/W7084107477","doi":"https://doi.org/10.1109/infocom55648.2025.11044576"},"language":"en","primary_location":{"id":"doi:10.1109/infocom55648.2025.11044576","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom55648.2025.11044576","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2025 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Jingjing Guan","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jingjing Guan","raw_affiliation_strings":["Beijing University of Posts and Telecommunications,China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications,China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Hui Li","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Li","raw_affiliation_strings":["Beijing University of Posts and Telecommunications,China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications,China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":null,"display_name":"XiangDong Li","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"XiangDong Li","raw_affiliation_strings":["Beijing University of Posts and Telecommunications,China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications,China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":null,"display_name":"XiaoLei Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"XiaoLei Wang","raw_affiliation_strings":["Beijing University of Posts and Telecommunications,China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications,China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Binghan Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Binghan Wang","raw_affiliation_strings":["Beijing University of Posts and Telecommunications,China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications,China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Qiuye Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiuye Wang","raw_affiliation_strings":["Zhejiang University,China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University,China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Shengchao Qin","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shengchao Qin","raw_affiliation_strings":["Xidian University,China"],"affiliations":[{"raw_affiliation_string":"Xidian University,China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Mengda He","orcid":null},"institutions":[{"id":"https://openalex.org/I874055015","display_name":"Teesside University","ror":"https://ror.org/03z28gk75","country_code":"GB","type":"education","lineage":["https://openalex.org/I874055015"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Mengda He","raw_affiliation_strings":["Teesside University,United Kingdom"],"affiliations":[{"raw_affiliation_string":"Teesside University,United Kingdom","institution_ids":["https://openalex.org/I874055015"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Md Armanuzzaman","orcid":null},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Md Armanuzzaman","raw_affiliation_strings":["Northeastern University,USA"],"affiliations":[{"raw_affiliation_string":"Northeastern University,USA","institution_ids":["https://openalex.org/I12912129"]}]},{"author_position":"last","author":{"id":null,"display_name":"Ziming Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ziming Zhao","raw_affiliation_strings":["Northeastern University,USA"],"affiliations":[{"raw_affiliation_string":"Northeastern University,USA","institution_ids":["https://openalex.org/I12912129"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":10,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.52999046,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T13116","display_name":"Heat Transfer and Numerical Methods","score":0.01889999955892563,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13116","display_name":"Heat Transfer and Numerical Methods","score":0.01889999955892563,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13370","display_name":"Diverse Scientific and Economic Studies","score":0.018400000408291817,"subfield":{"id":"https://openalex.org/subfields/2002","display_name":"Economics and Econometrics"},"field":{"id":"https://openalex.org/fields/20","display_name":"Economics, Econometrics and Finance"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12527","display_name":"Chemistry and Stereochemistry Studies","score":0.012600000016391277,"subfield":{"id":"https://openalex.org/subfields/1605","display_name":"Organic Chemistry"},"field":{"id":"https://openalex.org/fields/16","display_name":"Chemistry"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/handshake","display_name":"Handshake","score":0.9355999827384949},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.5383999943733215},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.5196999907493591},{"id":"https://openalex.org/keywords/finite-state-machine","display_name":"Finite-state machine","score":0.5123000144958496},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.5105999708175659},{"id":"https://openalex.org/keywords/equivalence","display_name":"Equivalence (formal languages)","score":0.45730000734329224},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4530999958515167},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.4507000148296356},{"id":"https://openalex.org/keywords/transport-layer-security","display_name":"Transport Layer Security","score":0.4077000021934509}],"concepts":[{"id":"https://openalex.org/C2778000800","wikidata":"https://www.wikidata.org/wiki/Q830043","display_name":"Handshake","level":3,"score":0.9355999827384949},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7817999720573425},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.5383999943733215},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.5196999907493591},{"id":"https://openalex.org/C167822520","wikidata":"https://www.wikidata.org/wiki/Q176452","display_name":"Finite-state machine","level":2,"score":0.5123000144958496},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.5105999708175659},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.4814000129699707},{"id":"https://openalex.org/C2780069185","wikidata":"https://www.wikidata.org/wiki/Q7977945","display_name":"Equivalence (formal languages)","level":2,"score":0.45730000734329224},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4530999958515167},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.4507000148296356},{"id":"https://openalex.org/C148176105","wikidata":"https://www.wikidata.org/wiki/Q206494","display_name":"Transport Layer Security","level":3,"score":0.4077000021934509},{"id":"https://openalex.org/C116253237","wikidata":"https://www.wikidata.org/wiki/Q1437424","display_name":"Formal specification","level":2,"score":0.39100000262260437},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.373199999332428},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.36000001430511475},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.35010001063346863},{"id":"https://openalex.org/C96654402","wikidata":"https://www.wikidata.org/wiki/Q5469962","display_name":"Formal equivalence checking","level":3,"score":0.3393000066280365},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33730000257492065},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.31459999084472656},{"id":"https://openalex.org/C199776023","wikidata":"https://www.wikidata.org/wiki/Q202875","display_name":"Negotiation","level":2,"score":0.30630001425743103},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.2815000116825104},{"id":"https://openalex.org/C161771561","wikidata":"https://www.wikidata.org/wiki/Q1970286","display_name":"Process calculus","level":2,"score":0.27390000224113464},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2734000086784363},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.2669000029563904},{"id":"https://openalex.org/C193702766","wikidata":"https://www.wikidata.org/wiki/Q1414548","display_name":"Concurrency","level":2,"score":0.26579999923706055},{"id":"https://openalex.org/C153180980","wikidata":"https://www.wikidata.org/wiki/Q19776675","display_name":"Commit","level":2,"score":0.26350000500679016},{"id":"https://openalex.org/C133112747","wikidata":"https://www.wikidata.org/wiki/Q7251931","display_name":"Protocol analysis","level":2,"score":0.26030001044273376}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocom55648.2025.11044576","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom55648.2025.11044576","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2025 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3387636824","display_name":null,"funder_award_id":"62472045","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321470","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"TLS":[1,26,77,94],"handshake":[2,7,104],"state":[3,78,105,129],"machine":[4,79,106],"manages":[5],"the":[6,15,19,22,25,44,73,76,81,90,103,109,128,134,148,164],"messages":[8],"exchanged":[9],"in":[10],"a":[11,65,157],"session":[12],"based":[13],"on":[14,54],"parameters":[16],"negotiated":[17],"between":[18,72],"client":[20],"and":[21,35,57,80,111,137,162],"server.":[23],"Although":[24],"1.3":[27],"standard":[28],"has":[29],"undergone":[30],"multiple":[31],"rounds":[32],"of":[33,75,88,143,156,159],"analysis":[34],"revisions":[36],"before":[37],"official":[38],"release":[39],"to":[40,50,68,114],"ensure":[41],"its":[42,116],"security,":[43],"process":[45],"from":[46,108],"natural":[47],"language":[48],"descriptions":[49],"implementations":[51],"still":[52],"relies":[53],"human":[55],"expertise":[56],"is":[58],"error-prone.":[59],"In":[60],"this":[61],"paper,":[62],"we":[63,101,151],"propose":[64],"systematic":[66],"method":[67],"conduct":[69,85],"equivalence":[70,124],"verification":[71,87,125,149],"implementation":[74,95,113],"standard.":[82],"We":[83],"also":[84],"formal":[86,117],"OpenSSL,":[89],"extensively":[91],"utilized":[92],"open-source":[93],"for":[96],"secure":[97],"communications.":[98],"Using":[99],"Cryptol,":[100],"model":[102,136,139],"both":[107],"standards":[110],"OpenSSL's":[112],"perform":[115],"verification.":[118],"Our":[119],"automatic":[120],"tool":[121],"E-Verify":[122],"performs":[123],"by":[126,133,147],"comparing":[127],"transition":[130],"sequences":[131],"produced":[132],"RFC":[135],"OpenSSL":[138],"with":[140],"all":[141],"combinations":[142],"negotiation":[144,166],"parameters.":[145],"Guided":[146],"results,":[150],"identify":[152],"640":[153],"mismatches":[154],"out":[155],"total":[158],"1,536":[160],"scenarios":[161],"pinpoint":[163],"corresponding":[165],"parameter":[167],"combinations.":[168]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
