Two-Pathway Model for Enhancement of Protocol Reverse Engineering

作者: Myung-Sup Kim , Kyu-Seok Shim , Young-Hoon Goo , Ui-Jun Baek

DOI:

关键词: Computer scienceProtocol (object-oriented programming)Reverse engineeringEmbedded system

摘要:

参考文章(16)
Yipeng Wang, Zhibin Zhang, Danfeng Yao, Buyun Qu, Li Guo, Inferring protocol state machine from network traces: a probabilistic approach applied cryptography and network security. pp. 1- 18 ,(2011) , 10.1007/978-3-642-21554-4_1
Weidong Cui, Helen J. Wang, Jayanthkumar Kannan, Discoverer: automatic protocol reverse engineering from network traces usenix security symposium. pp. 14- ,(2007)
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang, Mike Grace, ReFormat: automatic reverse engineering of encrypted messages european symposium on research in computer security. pp. 200- 215 ,(2009) , 10.1007/978-3-642-04444-1_13
Georges Bossert, Frédéric Guihéry, Guillaume Hiet, Towards automated protocol reverse engineering using semantic information computer and communications security. pp. 51- 62 ,(2014) , 10.1145/2590296.2590346
Maxim Shevertalov, Spiros Mancoridis, A Reverse Engineering Tool for Extracting Protocols of Networked Applications working conference on reverse engineering. pp. 229- 238 ,(2007) , 10.1109/WCRE.2007.6
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Song, Polyglot: automatic extraction of protocol message format using dynamic binary analysis computer and communications security. pp. 317- 329 ,(2007) , 10.1145/1315245.1315286
Joao Antunes, Nuno Neves, Paulo Verissimo, Reverse Engineering of Protocols from Network Traces working conference on reverse engineering. pp. 169- 178 ,(2011) , 10.1109/WCRE.2011.28
Yipeng Wang, Xingjian Li, Jiao Meng, Yong Zhao, Zhibin Zhang, Li Guo, Biprominer: Automatic Mining of Binary Protocol Features parallel and distributed computing: applications and technologies. pp. 179- 184 ,(2011) , 10.1109/PDCAT.2011.25
Paolo Milani Comparetti, Gilbert Wondracek, Christopher Kruegel, Engin Kirda, Prospex: Protocol Specification Extraction ieee symposium on security and privacy. pp. 110- 125 ,(2009) , 10.1109/SP.2009.14