Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol

Wei Wang, Dongyao Ji. Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol. In Kenji Suzuki, Teruo Higashino, Keiichi Yasumoto, Khaled El-Fakih, editors, Formal Techniques for Networked and Distributed Systems - FORTE 2008, 28th IFIP WG 6.1 International Conference, Tokyo, Japan, June 10-13, 2008, Proceedings. Volume 5048 of Lecture Notes in Computer Science, pages 305-323, Springer, 2008. [doi]

@inproceedings{WangJ08,
  title = {Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol},
  author = {Wei Wang and Dongyao Ji},
  year = {2008},
  doi = {10.1007/978-3-540-68855-6_20},
  url = {http://dx.doi.org/10.1007/978-3-540-68855-6_20},
  tags = {protocol},
  researchr = {https://researchr.org/publication/WangJ08},
  cites = {0},
  citedby = {0},
  pages = {305-323},
  booktitle = {Formal Techniques for Networked and Distributed Systems - FORTE 2008, 28th IFIP WG 6.1 International Conference, Tokyo, Japan, June 10-13, 2008, Proceedings},
  editor = {Kenji Suzuki and Teruo Higashino and Keiichi Yasumoto and Khaled El-Fakih},
  volume = {5048},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-540-68854-9},
}