Survey of protocol reverse engineering algorithms: Decomposition of tools for static traffic analysis

S Kleber, L Maile, F Kargl - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Knowledge about a network protocol to understand the communication between entities is
necessary for vulnerability research, penetration testing, malware analysis, network …

Protocol reverse-engineering methods and tools: A survey

Y Huang, H Shu, F Kang, Y Guang - Computer Communications, 2022 - Elsevier
The widespread utilization of network protocols raises many security and privacy concerns.
To address them, protocol reverse-engineering (PRE) has been broadly applied in diverse …

StateAFL: Greybox fuzzing for stateful network servers

R Natella - Empirical Software Engineering, 2022 - Springer
Fuzzing network servers is a technical challenge, since the behavior of the target server
depends on its state over a sequence of multiple messages. Existing solutions are costly …

[PDF][PDF] NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces.

Y Ye, Z Zhang, F Wang, X Zhang, D Xu - NDSS, 2021 - cs.purdue.edu
Network protocol reverse engineering is an important challenge with many security
applications. A popular kind of method leverages network message traces. These methods …

{NEMESYS}: Network message syntax reverse engineering by analysis of the intrinsic structure of individual messages

S Kleber, H Kopp, F Kargl - 12th USENIX Workshop on Offensive …, 2018 - usenix.org
Protocol reverse engineering based on traffic traces allows to analyze observable network
messages. Thereby, message formats of unknown protocols can be inferred. We present a …

[PDF][PDF] BinaryInferno: A Semantic-Driven Approach to Field Inference for Binary Message Formats.

J Chandler, A Wick, K Fisher - NDSS, 2023 - ndss-symposium.org
We present BinaryInferno, a fully automatic tool for reverse engineering binary message
formats. Given a set of messages with the same format, the tool uses an ensemble of …

Extracting protocol format as state machine via controlled static loop analysis

Q Shi, X Xu, X Zhang - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
Reverse engineering of protocol message formats is critical for many security applications.
Mainstream techniques use dynamic analysis and inherit its low-coverage problem—the …

Lifting network protocol implementation to precise format specification with security applications

Q Shi, J Shao, Y Ye, M Zheng, X Zhang - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
While inferring protocol formats is critical for many security applications, existing techniques
often fall short of coverage, inasmuch as almost all of them are in a fashion of dynamic …

Protocol specification extraction based on contiguous sequential pattern algorithm

YH Goo, KS Shim, MS Lee, MS Kim - IEEE Access, 2019 - ieeexplore.ieee.org
As the amount of Internet traffic increases due to newly emerging applications and their
malicious behaviors, the amount of traffic that must be analyzed is rapidly increasing. Many …

A multi-server biometric authentication scheme based on extended chaotic map for telecare medical information system

XY Zhai, J Wang - Multimedia Tools and Applications, 2022 - Springer
Abstract Telemedicine Information System (TMIS) is a platform for data communication and
exchange between patients and medical servers via the Internet. Recently, Lee et al …