Research Article
A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace
Table 4
The traces of function return values of protocol implementations.
| ā | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 |
| IDH () | 1 | 1 | 32 | 1 | 1 | 0 | 0 | 77 | 32 | 128 | 136 | 0 | 1 | 1 | 32 | 1 | 1 | 0 | 77 | 32 | 69 | 8 | MADH () | 0 | 1 | 1 | 32 | 1 | 1 | 0 | 77 | 32 | 40 | 8 | 1 | 1 | 32 | 1 | 1 | 0 | 0 | 77 | 32 | 112 | 40 | IDHS () | 1 | 1 | 32 | 1 | 1 | 0 | 0 | 77 | 32 | 112 | 104 | 0 | 1 | 1 | 32 | 1 | 1 | 0 | 77 | 32 | 112 | 40 | MADHS () | 0 | 1 | 1 | 32 | 1 | 1 | 0 | 77 | 32 | 114 | 120 | 1 | 1 | 32 | 1 | 1 | 0 | 0 | 77 | 32 | 144 | 142 |
|
|