Academic literature on the topic 'Protocol Reverse Engineering'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Protocol Reverse Engineering.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Protocol Reverse Engineering"
Sija, Baraka D., Young-Hoon Goo, Kyu-Seok Shim, Huru Hasanova, and Myung-Sup Kim. "A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View." Security and Communication Networks 2018 (2018): 1–17. http://dx.doi.org/10.1155/2018/8370341.
Full textYu, Tianxiang, Yang Xin, Yuexin Tao, Bingqing Hou, and Hongliang Zhu. "Network Communication Protocol Reverse Engineering Based on Auto-Encoder." Security and Communication Networks 2022 (October 6, 2022): 1–14. http://dx.doi.org/10.1155/2022/2924479.
Full textTao, Huan Qi, Fan Jia, and Yang Wang. "Comparative Analysis of the Status of the Network Protocol Reverse Engineering." Applied Mechanics and Materials 590 (June 2014): 722–26. http://dx.doi.org/10.4028/www.scientific.net/amm.590.722.
Full textDzhum, V. S., and V. A. Losev. "Analysis of network protocol reverse engineering tools." Information Security Questions, no. 1 (2021): 3–10. http://dx.doi.org/10.52190/2073-2600_2021_1_3.
Full textXiao, Ming-Ming, and Yu-Ping Luo. "Automatic protocol reverse engineering using grammatical inference." Journal of Intelligent & Fuzzy Systems 32, no. 5 (April 24, 2017): 3585–94. http://dx.doi.org/10.3233/jifs-169294.
Full textLuo, Jian-Zhen, Shun-Zheng Yu, and Jun Cai. "Capturing Uncertainty Information and Categorical Characteristics for Network Payload Grouping in Protocol Reverse Engineering." Mathematical Problems in Engineering 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/962974.
Full textHuang, Yuyao, Hui Shu, Fei Kang, and Yan Guang. "Protocol Reverse-Engineering Methods and Tools: A Survey." Computer Communications 182 (January 2022): 238–54. http://dx.doi.org/10.1016/j.comcom.2021.11.009.
Full textNarayan, John, Sandeep K. Shukla, and T. Charles Clancy. "A Survey of Automatic Protocol Reverse Engineering Tools." ACM Computing Surveys 48, no. 3 (February 8, 2016): 1–26. http://dx.doi.org/10.1145/2840724.
Full textJi, Yukai, Tao Huang, Chunlai Ma, Chao Hu, Zhanfeng Wang, and Anmin Fu. "IMCSA: Providing Better Sequence Alignment Space for Industrial Control Protocol Reverse Engineering." Security and Communication Networks 2022 (November 24, 2022): 1–9. http://dx.doi.org/10.1155/2022/8026280.
Full textCai, Jun, Jian-Zhen Luo, and Fangyuan Lei. "Analyzing Network Protocols of Application Layer Using Hidden Semi-Markov Model." Mathematical Problems in Engineering 2016 (2016): 1–14. http://dx.doi.org/10.1155/2016/9161723.
Full textDissertations / Theses on the topic "Protocol Reverse Engineering"
Greau-Hamard, Pierre-Samuel. "Contribution à l’apprentissage non supervisé de protocoles pour la couche de Liaison de données dans les systèmes communicants, à l'aide des Réseaux Bayésiens." Thesis, CentraleSupélec, 2021. http://www.theses.fr/2021CSUP0009.
Full textThe world of telecommunications is rapidly developing, especially in the area of the Internet of Things; in such a context, it would be useful to be able to analyze any unknown protocol one might encounter. For this purpose, obtaining the state machine and frame formats of the target protocol is essential. These two elements can be extracted from network traces and/or execution traces using Protocol Reverse Engineering (PRE) techniques.By analyzing the performance of three algorithms used in PRE systems, we discovered the potential of models based on Bayesian networks. We then developed Bayesian Network Frame Format Finder (BaNet3F), our own frame format learning model based on Bayesian networks, and showed that its performance is significantly better than the state of the art. BaNet3F also includes an optimized version of the Viterbi algorithm, applicable to any Bayesian network, thanks to its ability to generate the necessary Markov boundaries itself
Bossert, Georges. "Exploiting Semantic for the Automatic Reverse Engineering of Communication Protocols." Thesis, Supélec, 2014. http://www.theses.fr/2014SUPL0027/document.
Full textThis thesis exposes a practical approach for the automatic reverse engineering of undocumented communication protocols. Current work in the field of automated protocol reverse engineering either infer incomplete protocol specifications or require too many stimulation of the targeted implementation with the risk of being defeated by counter-inference techniques. We propose to tackle these issues by leveraging the semantic of the protocol to improve the quality, the speed and the stealthiness of the inference process. This work covers the two main aspects of the protocol reverse engineering, the inference of its syntactical definition and of its grammatical definition. We propose an open-source tool, called Netzob, that implements our work to help security experts in their work against latest cyber-threats. We claim Netzob is the most advanced published tool that tackles issues related to the reverse engineering and the simulation of undocumented protocols
McCulley, Shane. "Forensic Analysis of G Suite Collaborative Protocols." ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2386.
Full textGkaniatsou, Andriana Evgenia. "Analysis of low-level implementations of cryptographic protocols." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/29613.
Full textScarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.
Full textTien, Quan Bui, and 裴進軍. "ReFSM: Reverse Engineering from Protocol Traces to Test Generation by Extended Finite State Machines." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/3wq2xx.
Full text國立交通大學
電機資訊國際學程
106
Protocol reverse engineering is helpful to automatically obtain the specification of protocols which are useful for network security systems and test case generation tools. To achieve better accuracy, these kinds of applications require good models that should capture not only the order of exchanging message (control flow aspect), but also the data being transmitted (data flow aspect). However, current techniques only focus on inferring the control flow represented as a Finite State Machines (FSM) and without interpreting the data flow. The Extended Finite State Machine (EFSM), embedding memories in the states and data guards in the FSM transitions, is a method commonly used to represent the data flow. In this work, we propose the ReFSM, a novel method to infer the EFSMs of protocols from only the network traces. Our method is evaluated by using datasets of four network traces including two text-based protocols (FTP and SMTP) and two binary protocols (Bittorrent and PPLive). Based on the evaluation results, the coverage, accuracy scores of correctness and behavior of inferred models are always higher than 90%. The inferred EFSMs are close to the correct model deriving from protocol specification.
Liu, Yi-Jun, and 劉怡君. "The False-Dilemma Approach to Data Protocol Reverse Engineering for Diesel Engine Glow Plug with CAN Bus." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/u4yau2.
Full text國立彰化師範大學
車輛科技研究所
106
This paper mainly studies the false-dilemma approach to the reverse engineering for diesel engine glow plug control via CAN bus. According to the manufacturer, the different needs of the vehicle design provide different data communication protocols. However, some data communication protocols of the CAN bus from the manufacturers are not always published. If we can detect and decode the CAN bus data communication protocols, we can fully control the subsystems equipped with CAN bus. As to manufacturers, that will help them to solve such kinds of problems. In general, the digital control signals decoded from the CAN data can be switch type and numeral type. This study focuses on the switch type of the CAN data. This thesis originally proposes the so-called false-dilemma approach. This study creates a near authentic environment of the diesel engine glow plug with CAN bus in order to verify the feasibility and the efficiency through the proposed approach. In this environment, the control mapping to the switch is flexible and adjustable. The results show that 1) this approach is feasible to solve the digital control signals decoded from the CAN data can be switch type and numeral type; 2) this approach can save the decoding time tremendously for large possible switch control number; 3) the computation times depend on the power number of 2 which is equal to the possible switch control number; 4) this approach can solve not only the one-control-one-switch problems but one-control-multi-switch problems. It is intuitive that the proposed approach can be applied to the reverse engineering of not only the CAN data but other switch-type signals data communication protocols.
Chiu, Ling, and 邱陵. "The study of the reverse engineering for communication protocols." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/30179502443528436185.
Full text國立清華大學
資訊工程學系
88
Fast development in networking and wireless communication result in a large amount of services provided via them. Each service needs to cooperate with a communication protocol which is defined as a set of rules that each part involved in the communication environment must abide. Communication pro-tocols are more complicated nowadays to satisfy different requirement in bandwidth, response time, data format, security…etc. When a new communication protocol is implemented, the most critical problem is it is very hard to get a full understanding only from the specification of the communication protocol. To solve this, a reverse engineering way is invoked. We perform testing on a validated product. The testing report is used to clarify the uncertain parts of the specification. This process is usually repeated and time consuming. In this thesis, we propose a systematic way to do reverse engineering for communication protocols. We also developed automatic tools to experiment our theory.
Book chapters on the topic "Protocol Reverse Engineering"
Duchêne, J., C. Le Guernic, E. Alata, V. Nicomette, and M. Kaâniche. "Protocol Reverse Engineering: Challenges and Obfuscation." In Lecture Notes in Computer Science, 139–44. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54876-0_11.
Full textCai, Jun, Jian-Zhen Luo, Jianliang Ruan, and Yan Liu. "Toward Fuzz Test Based on Protocol Reverse Engineering." In Information Security Practice and Experience, 892–97. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72359-4_56.
Full textChen, Yige, Tianning Zang, Yongzheng Zhang, Yuan Zhou, Peng Yang, and Yipeng Wang. "Inspector: A Semantics-Driven Approach to Automatic Protocol Reverse Engineering." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 348–67. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92635-9_21.
Full textLee, Choongin, Jeonghan Bae, and Heejo Lee. "PRETT: Protocol Reverse Engineering Using Binary Tokens and Network Traces." In ICT Systems Security and Privacy Protection, 141–55. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99828-2_11.
Full textLi, Weiming, Meirong Ai, and Bo Jin. "A Network Protocol Reverse Engineering Method Based on Dynamic Taint Propagation Similarity." In Intelligent Computing Theories and Application, 580–92. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-42291-6_58.
Full textAli, Mohammed Aamir, and Aad van Moorsel. "Designed to Be Broken: A Reverse Engineering Study of the 3D Secure 2.0 Payment Protocol." In Financial Cryptography and Data Security, 201–21. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32101-7_13.
Full textLobo, Daniel. "Formalizing Phenotypes of Regeneration." In Methods in Molecular Biology, 663–79. New York, NY: Springer US, 2022. http://dx.doi.org/10.1007/978-1-0716-2172-1_36.
Full text"An automatic network protocol reverse engineering method for vulnerability discovery." In Network Security and Communication Engineering, 65–70. CRC Press, 2015. http://dx.doi.org/10.1201/b18660-14.
Full textFavre, Liliana Maria. "Non-Mobile Software Modernization in Accordance With the Principles of Model-Driven Engineering." In IoT Protocols and Applications for Improving Industry, Environment, and Society, 29–60. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-6463-9.ch002.
Full textTu, Zhiying, Gregory Zacharewicz, and David Chen. "Harmonized and Reversible Development Framework for HLA based Interoperable Application." In Handbook of Research on E-Business Standards and Protocols, 58–83. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0146-8.ch004.
Full textConference papers on the topic "Protocol Reverse Engineering"
Trifilo, Antonio, Stefan Burschka, and Ernst Biersack. "Traffic to protocol reverse engineering." In 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA). IEEE, 2009. http://dx.doi.org/10.1109/cisda.2009.5356565.
Full textHe, Yongjun, Hui Shu, and Xiaobing Xiong. "Protocol Reverse Engineering Based on DynamoRIO." In 2009 International Conference on Information and Multimedia Technology. IEEE, 2009. http://dx.doi.org/10.1109/icimt.2009.26.
Full textInsik Jung, Hyeonwoo Kim, Dong-Kweon Hong, and Hongtaek Ju. "Protocol Reverse Engineering to Facebook Messages." In 2013 Fourth International Conference on Intelligent Systems, Modelling and Simulation (ISMS 2013). IEEE, 2013. http://dx.doi.org/10.1109/isms.2013.30.
Full textTomicic, Igor, Petra Grd, and Markus Schatten. "Reverse Engineering of the MMORPG Client Protocol." In 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, 2019. http://dx.doi.org/10.23919/mipro.2019.8756873.
Full textKiechle, Valentin, Matthias Börsig, Sven Nitzsche, Ingmar Baumgart, and Jürgen Becker. "PREUNN: Protocol Reverse Engineering using Neural Networks." In 8th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2022. http://dx.doi.org/10.5220/0010813500003120.
Full textQuante, Jochen, and Rainer Koschke. "Dynamic Protocol Recovery." In 14th Working Conference on Reverse Engineering (WCRE 2007). IEEE, 2007. http://dx.doi.org/10.1109/wcre.2007.24.
Full textLei Ming and Zan Yuping. "Protocol reverse engineering and interference control of FLASHGET." In 2014 International Conference on Information and Communications Technologies (ICT 2014). Institution of Engineering and Technology, 2014. http://dx.doi.org/10.1049/cp.2014.0592.
Full textBossert, Georges, Frédéric Guihéry, and Guillaume Hiet. "Towards automated protocol reverse engineering using semantic information." In ASIA CCS '14: 9th ACM Symposium on Information, Computer and Communications Security. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2590296.2590346.
Full textLi, Haifeng, Bo Shuai, Jian Wang, and Chaojing Tang. "Protocol Reverse Engineering Using LDA and Association Analysis." In 2015 11th International Conference on Computational Intelligence and Security (CIS). IEEE, 2015. http://dx.doi.org/10.1109/cis.2015.83.
Full textYe, Yapeng, Zhuo Zhang, Fei Wang, Xiangyu Zhang, and Dongyan Xu. "NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2021. http://dx.doi.org/10.14722/ndss.2021.24531.
Full text