Matt Fredrikson, Somesh Jha, et al.
S&P 2010
This paper describes a tool for validating the proper configuration of the IPSEC protocol suite including IKE. The tool validates that two hosts are able to communicate (normal ping functionality) and that this communication is occurring using the proper authentication/encryption transformations as required by IPSEC. IPSEC configuration is very complex, and administrators are often unable to determine if a machine configuration is offering the desired protection. IPSEC and IKE operate in a manner transparent to IP applications; an administrator is therefore unable to check the proper operation of an IPSEC ''security association'' using traditional IP tools.
Matt Fredrikson, Somesh Jha, et al.
S&P 2010
Pralhad Deshpande, Shachi Sharma, et al.
SCC 2014
Aameek Singh, Arup Acharya
SIGCOMM 2004
Ting Wang, Xin Hu, et al.
ICDEW 2014