Building an Automaton Towards Reverse Protocol Engineering (original) (raw)

Reverse Engineering of Protocols from Network Traces

João Antunes

homepages.di.fc.ul.pt

View PDFchevron_right

A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View

Baraka Sija

Security and Communication Networks

View PDFchevron_right

ReverX: Reverse engineering of protocols

João Antunes

2011

View PDFchevron_right

Survey on network protocol reverse engineering approaches, methods and tools

Baraka Sija

2017

View PDFchevron_right

State of the art of network protocol reverse engineering tools

Mohamed Kaâniche

Journal of Computer Virology and Hacking Techniques, 2017

View PDFchevron_right

Automatic Protocol Reverse-Engineering: Message Format Extraction and Field Semantics Inference

Naveen Kumar

View PDFchevron_right

Protocol Reverse Engineering: Challenges and Obfuscation

Mohamed Kaaniche

Lecture Notes in Computer Science, 2017

View PDFchevron_right

Automatically complementing protocol specifications from network traces

João Antunes

Proceedings of the 13th European Workshop on …, 2011

View PDFchevron_right

Recovery of communications protocol design from protocol execution traces

kassem afif saleh

1996

View PDFchevron_right

Communications software reverse engineering: a semi-automatic approach

kassem afif saleh

Information and Software Technology, 1996

View PDFchevron_right

Polyglot: automatic extraction of protocol message format using dynamic binary analysis

Juan Caballero

2007

View PDFchevron_right

A generic application-level protocol analyzer and its language

Chuanxiong Guo

2007

View PDFchevron_right

From protocol specifications to flaws and attack scenarios: an automatic and formal algorithm

Nadia Tawbi

Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises

View PDFchevron_right

Automatic Generation of Security Protocols Attacks Specifications and Implementations

Paolo Modesti

Cybersecurity and Applications, 2024

View PDFchevron_right

Tracing Protocols

Gerard Holzmann

2000

View PDFchevron_right

ReFSM: Reverse engineering from protocol packet traces to test generation by extended finite state machines

Quan Bui

Journal of Network and Computer Applications, 2020

View PDFchevron_right

On the Automated Correction of Security Protocols Susceptible to a Replay Attack

Dieter Hutter

European Symposium on Research in Computer Security, 2007

View PDFchevron_right

Automatic synthesis of interfaces between incompatible protocols

Alberto Sangiovanni Vincentelli

1998

View PDFchevron_right

Automated composition of security protocols

Piroska Haller

… Computer Communication and …, 2009

View PDFchevron_right

On understanding normal protocol behaviour to monitor and mitigate the abnormal

Helmut Leopold

2006

View PDFchevron_right

Synthesizing a protocol converter from executable protocol traces

Murali Rajagopal

IEEE Transactions on Computers, 1991

View PDFchevron_right

On limits and possibilities of automated protocol analysis

Gerard Holzmann

2006

View PDFchevron_right

On-The-Fly Automatic Generation of Security Protocols

Shinsaku Kiyomoto

2008

View PDFchevron_right

Automated Reasoning for Security Protocol Analysis

Jorge Cuellar

Journal of Automated Reasoning, 2006

View PDFchevron_right

Design of an Efficient Security Protocol Analyzer

Shinsaku Kiyomoto

2007

View PDFchevron_right

Dissecting Customized Protocols

Kibum Choi

Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

View PDFchevron_right

Dynamic analysis of security protocols

Alec Yasinsac

Proceedings of the 2000 Workshop on New Security Paradigms, 2001

View PDFchevron_right

Rule-based Verification of Network Protocol Implementations using Symbolic Execution

Peter Pietzuch

2011

View PDFchevron_right

Towards analyzing and synthesizing protocols

Daniel Brand

… IEEE Transactions on, 1980

View PDFchevron_right