Building an Automaton Towards Reverse Protocol Engineering (original) (raw)
Related papers
Reverse Engineering of Protocols from Network Traces
homepages.di.fc.ul.pt
Security and Communication Networks
ReverX: Reverse engineering of protocols
2011
Survey on network protocol reverse engineering approaches, methods and tools
2017
State of the art of network protocol reverse engineering tools
Journal of Computer Virology and Hacking Techniques, 2017
Automatic Protocol Reverse-Engineering: Message Format Extraction and Field Semantics Inference
Protocol Reverse Engineering: Challenges and Obfuscation
Lecture Notes in Computer Science, 2017
Automatically complementing protocol specifications from network traces
Proceedings of the 13th European Workshop on …, 2011
Recovery of communications protocol design from protocol execution traces
1996
Communications software reverse engineering: a semi-automatic approach
Information and Software Technology, 1996
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
2007
A generic application-level protocol analyzer and its language
2007
From protocol specifications to flaws and attack scenarios: an automatic and formal algorithm
Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Automatic Generation of Security Protocols Attacks Specifications and Implementations
Cybersecurity and Applications, 2024
2000
Journal of Network and Computer Applications, 2020
On the Automated Correction of Security Protocols Susceptible to a Replay Attack
European Symposium on Research in Computer Security, 2007
Automatic synthesis of interfaces between incompatible protocols
Alberto Sangiovanni Vincentelli
1998
Automated composition of security protocols
… Computer Communication and …, 2009
On understanding normal protocol behaviour to monitor and mitigate the abnormal
2006
Synthesizing a protocol converter from executable protocol traces
IEEE Transactions on Computers, 1991
On limits and possibilities of automated protocol analysis
2006
On-The-Fly Automatic Generation of Security Protocols
2008
Automated Reasoning for Security Protocol Analysis
Journal of Automated Reasoning, 2006
Design of an Efficient Security Protocol Analyzer
2007
Dissecting Customized Protocols
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Dynamic analysis of security protocols
Proceedings of the 2000 Workshop on New Security Paradigms, 2001
Rule-based Verification of Network Protocol Implementations using Symbolic Execution
2011
Towards analyzing and synthesizing protocols
… IEEE Transactions on, 1980