A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View (original) (raw)

Survey on network protocol reverse engineering approaches, methods and tools

Baraka Sija

2017

View PDFchevron_right

State of the art of network protocol reverse engineering tools

Mohamed Kaâniche

Journal of Computer Virology and Hacking Techniques, 2017

View PDFchevron_right

Automatic Protocol Reverse-Engineering: Message Format Extraction and Field Semantics Inference

Naveen Kumar

View PDFchevron_right

Building an Automaton Towards Reverse Protocol Engineering

João Antunes

2009

View PDFchevron_right

Reverse Engineering of Protocols from Network Traces

João Antunes

homepages.di.fc.ul.pt

View PDFchevron_right

ReverX: Reverse engineering of protocols

João Antunes

2011

View PDFchevron_right

Protocol Reverse Engineering: Challenges and Obfuscation

Mohamed Kaaniche

Lecture Notes in Computer Science, 2017

View PDFchevron_right

Automatically complementing protocol specifications from network traces

João Antunes

Proceedings of the 13th European Workshop on …, 2011

View PDFchevron_right

Polyglot: automatic extraction of protocol message format using dynamic binary analysis

Juan Caballero

2007

View PDFchevron_right

ReFSM: Reverse engineering from protocol packet traces to test generation by extended finite state machines

Quan Bui

Journal of Network and Computer Applications, 2020

View PDFchevron_right

Communications software reverse engineering: a semi-automatic approach

kassem afif saleh

Information and Software Technology, 1996

View PDFchevron_right

Recovery of communications protocol design from protocol execution traces

kassem afif saleh

1996

View PDFchevron_right

Synthesizing a protocol converter from executable protocol traces

Murali Rajagopal

IEEE Transactions on Computers, 1991

View PDFchevron_right

A generic application-level protocol analyzer and its language

Chuanxiong Guo

2007

View PDFchevron_right

On understanding normal protocol behaviour to monitor and mitigate the abnormal

Helmut Leopold

2006

View PDFchevron_right

Model-Driven Extraction and Analysis of Network Security Policies

Jordi Cabot

Lecture Notes in Computer Science, 2013

View PDFchevron_right

Automatic Feature Isolation in Network Protocol Software Implementations

Zhuoqing Mao

Proceedings of the 2020 ACM Workshop on Forming an Ecosystem Around Software Transformation, 2020

View PDFchevron_right

Automatic Generation of Security Protocols Attacks Specifications and Implementations

Paolo Modesti

Cybersecurity and Applications, 2024

View PDFchevron_right

Automated composition of security protocols

Piroska Haller

… Computer Communication and …, 2009

View PDFchevron_right

From protocol specifications to flaws and attack scenarios: an automatic and formal algorithm

Nadia Tawbi

Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises

View PDFchevron_right

Automatic synthesis of interfaces between incompatible protocols

Alberto Sangiovanni Vincentelli

1998

View PDFchevron_right

Protocol Normalization Using Attribute Grammars

Randy Smith

Lecture Notes in Computer Science, 2009

View PDFchevron_right

Exploring Unsupervised Learning Methods for Automated Protocol Analysis

Clarence Ong

2021 IEEE Symposium Series on Computational Intelligence (SSCI)

View PDFchevron_right

Tracing Protocols

Gerard Holzmann

2000

View PDFchevron_right

A simple method for extracting models from protocol code

david lie

2001

View PDFchevron_right

On the Automated Correction of Security Protocols Susceptible to a Replay Attack

Dieter Hutter

Computer Security – ESORICS 2007, 2007

View PDFchevron_right

A Security Analysis Method for Security Protocol Implementations Based on Message Construction

Chin-Tser Huang

Applied Sciences, 2018

View PDFchevron_right

A Modeling Framework for Generating Security Protocol Specifications

Iosif Ignat

2008 10th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2008

View PDFchevron_right