Inferring protocol state machine for binary communication protocol

作者: Fanzhi Meng , Yuan Liu , Chunrui Zhang , Tong Li , Yang Yue

DOI: 10.1109/WARTIA.2014.6976411

关键词:

摘要:

参考文章(8)
Yipeng Wang, Zhibin Zhang, Danfeng Yao, Buyun Qu, Li Guo, Inferring protocol state machine from network traces: a probabilistic approach applied cryptography and network security. pp. 1- 18 ,(2011) , 10.1007/978-3-642-21554-4_1
Weidong Cui, Helen J. Wang, Jayanthkumar Kannan, Discoverer: automatic protocol reverse engineering from network traces usenix security symposium. pp. 14- ,(2007)
Maxim Shevertalov, Spiros Mancoridis, A Reverse Engineering Tool for Extracting Protocols of Networked Applications working conference on reverse engineering. pp. 229- 238 ,(2007) , 10.1109/WCRE.2007.6
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Song, Polyglot: automatic extraction of protocol message format using dynamic binary analysis computer and communications security. pp. 317- 329 ,(2007) , 10.1145/1315245.1315286
Ming-Ming Xiao, Shun-Zheng Yu, Yu Wang, Automatic Network Protocol Automaton Extraction network and system security. pp. 336- 343 ,(2009) , 10.1109/NSS.2009.71
Antonio Trifilo, Stefan Burschka, Ernst Biersack, Traffic to protocol reverse engineering computational intelligence and security. pp. 257- 264 ,(2009) , 10.1109/CISDA.2009.5356565
Yating Hsu, Guoqiang Shu, David Lee, A model-based approach to security flaw detection of network protocol implementations international conference on network protocols. pp. 114- 123 ,(2008) , 10.1109/ICNP.2008.4697030
Xiaoyan HUANG, Xingyuan CHEN, Ning ZHU, Huilin TANG, Protocol state machine reverse method based on labeling state: Protocol state machine reverse method based on labeling state Journal of Computer Applications. ,vol. 33, pp. 3486- 3489 ,(2013) , 10.3724/SP.J.1087.2013.03486