Research Article
A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace
Table 1
The trace of function return values of protocol implementations.
| ā | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 |
| INS () | 80 | 1 | 136 | 216 | 144 | 176 | 53 | 5 | 192 | 128 | 128 | 128 | 128 | 208 | 1 | 168 | 216 | 16 | 48 | 53 | 1 | 192 | MANS () | 112 | 1 | 216 | 216 | 176 | 208 | 53 | 5 | 80 | 128 | 128 | 128 | 128 | 240 | 1 | 187 | 216 | 48 | 80 | 53 | 1 | 47 | INSL () | 80 | 1 | 136 | 216 | 144 | 176 | 53 | 5 | 192 | 128 | 128 | 128 | 128 | 208 | 1 | 175 | 216 | 16 | 48 | 53 | 1 | 200 | MANSL () | 112 | 1 | 240 | 216 | 176 | 208 | 53 | 5 | 80 | 128 | 128 | 128 | 128 | 240 | 1 | 178 | 216 | 48 | 80 | 53 | 1 | 147 |
| ā | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 |
| INS () | 128 | 128 | 128 | 128 | 176 | 208 | 53 | 5 | 208 | 128 | 128 | 173 | 241 | 0 | 0 | 128 | 128 | 244 | 191 | 0 | 0 | 1 | MANS () | 128 | 128 | 128 | 208 | 208 | 240 | 53 | 5 | 128 | 128 | 128 | 128 | 128 | 0 | 0 | 0 | 1 | 216 | 0 | 0 | 216 | 0 | INSL () | 128 | 128 | 128 | 128 | 176 | 208 | 53 | 5 | 208 | 128 | 210 | 210 | 244 | 16 | 0 | 128 | 128 | 244 | 149 | 0 | 0 | 1 | MANSL () | 128 | 128 | 128 | 128 | 208 | 240 | 53 | 5 | 128 | 128 | 128 | 128 | 128 | 0 | 0 | 0 | 1 | 216 | 0 | 0 | 216 | 0 |
|
|