- Reference: a catalog of reusable assertion patterns you can adapt to your own protocol
- Explanation: case studies that explain how real exploits worked and why specific assertions would have blocked them
How to Use This Book
Browse Assertion Patterns
Use the reference catalog when you already know the type of risk you want to cover.
Study Real Exploits
Use the case studies when you want to understand why an exploit worked and what assertion would have stopped it.
See Full Protocol Suites
Review deeper examples that show how assertion coverage can be shaped for a real protocol.
Start Building
Leave the book and follow a tutorial when you want to build your own assertion from scratch.

