Survey of protocol reverse engineering algorithms: Decomposition of tools for static traffic analysis
Knowledge about a network protocol to understand the communication between entities is
necessary for vulnerability research, penetration testing, malware analysis, network …
necessary for vulnerability research, penetration testing, malware analysis, network …
Protocol reverse-engineering methods and tools: A survey
Y Huang, H Shu, F Kang, Y Guang - Computer Communications, 2022 - Elsevier
The widespread utilization of network protocols raises many security and privacy concerns.
To address them, protocol reverse-engineering (PRE) has been broadly applied in diverse …
To address them, protocol reverse-engineering (PRE) has been broadly applied in diverse …
StateAFL: Greybox fuzzing for stateful network servers
R Natella - Empirical Software Engineering, 2022 - Springer
Fuzzing network servers is a technical challenge, since the behavior of the target server
depends on its state over a sequence of multiple messages. Existing solutions are costly …
depends on its state over a sequence of multiple messages. Existing solutions are costly …
[PDF][PDF] NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces.
Network protocol reverse engineering is an important challenge with many security
applications. A popular kind of method leverages network message traces. These methods …
applications. A popular kind of method leverages network message traces. These methods …
{NEMESYS}: Network message syntax reverse engineering by analysis of the intrinsic structure of individual messages
Protocol reverse engineering based on traffic traces allows to analyze observable network
messages. Thereby, message formats of unknown protocols can be inferred. We present a …
messages. Thereby, message formats of unknown protocols can be inferred. We present a …
[PDF][PDF] BinaryInferno: A Semantic-Driven Approach to Field Inference for Binary Message Formats.
J Chandler, A Wick, K Fisher - NDSS, 2023 - ndss-symposium.org
We present BinaryInferno, a fully automatic tool for reverse engineering binary message
formats. Given a set of messages with the same format, the tool uses an ensemble of …
formats. Given a set of messages with the same format, the tool uses an ensemble of …
Extracting protocol format as state machine via controlled static loop analysis
Reverse engineering of protocol message formats is critical for many security applications.
Mainstream techniques use dynamic analysis and inherit its low-coverage problem—the …
Mainstream techniques use dynamic analysis and inherit its low-coverage problem—the …
Lifting network protocol implementation to precise format specification with security applications
While inferring protocol formats is critical for many security applications, existing techniques
often fall short of coverage, inasmuch as almost all of them are in a fashion of dynamic …
often fall short of coverage, inasmuch as almost all of them are in a fashion of dynamic …
Protocol specification extraction based on contiguous sequential pattern algorithm
As the amount of Internet traffic increases due to newly emerging applications and their
malicious behaviors, the amount of traffic that must be analyzed is rapidly increasing. Many …
malicious behaviors, the amount of traffic that must be analyzed is rapidly increasing. Many …
A multi-server biometric authentication scheme based on extended chaotic map for telecare medical information system
XY Zhai, J Wang - Multimedia Tools and Applications, 2022 - Springer
Abstract Telemedicine Information System (TMIS) is a platform for data communication and
exchange between patients and medical servers via the Internet. Recently, Lee et al …
exchange between patients and medical servers via the Internet. Recently, Lee et al …