Academic literature on the topic 'Protocol Reverse Engineering'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Protocol Reverse Engineering.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Protocol Reverse Engineering"
Sija, Baraka D., Young-Hoon Goo, Kyu-Seok Shim, Huru Hasanova, and Myung-Sup Kim. "A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View." Security and Communication Networks 2018 (2018): 1–17. http://dx.doi.org/10.1155/2018/8370341.
Full textYu, Tianxiang, Yang Xin, Yuexin Tao, Bingqing Hou, and Hongliang Zhu. "Network Communication Protocol Reverse Engineering Based on Auto-Encoder." Security and Communication Networks 2022 (October 6, 2022): 1–14. http://dx.doi.org/10.1155/2022/2924479.
Full textTao, Huan Qi, Fan Jia, and Yang Wang. "Comparative Analysis of the Status of the Network Protocol Reverse Engineering." Applied Mechanics and Materials 590 (June 2014): 722–26. http://dx.doi.org/10.4028/www.scientific.net/amm.590.722.
Full textDzhum, V. S., and V. A. Losev. "Analysis of network protocol reverse engineering tools." Information Security Questions, no. 1 (2021): 3–10. http://dx.doi.org/10.52190/2073-2600_2021_1_3.
Full textXiao, Ming-Ming, and Yu-Ping Luo. "Automatic protocol reverse engineering using grammatical inference." Journal of Intelligent & Fuzzy Systems 32, no. 5 (2017): 3585–94. http://dx.doi.org/10.3233/jifs-169294.
Full textLuo, Jian-Zhen, Shun-Zheng Yu, and Jun Cai. "Capturing Uncertainty Information and Categorical Characteristics for Network Payload Grouping in Protocol Reverse Engineering." Mathematical Problems in Engineering 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/962974.
Full textHuang, Yuyao, Hui Shu, Fei Kang, and Yan Guang. "Protocol Reverse-Engineering Methods and Tools: A Survey." Computer Communications 182 (January 2022): 238–54. http://dx.doi.org/10.1016/j.comcom.2021.11.009.
Full textNarayan, John, Sandeep K. Shukla, and T. Charles Clancy. "A Survey of Automatic Protocol Reverse Engineering Tools." ACM Computing Surveys 48, no. 3 (2016): 1–26. http://dx.doi.org/10.1145/2840724.
Full textJi, Yukai, Tao Huang, Chunlai Ma, Chao Hu, Zhanfeng Wang, and Anmin Fu. "IMCSA: Providing Better Sequence Alignment Space for Industrial Control Protocol Reverse Engineering." Security and Communication Networks 2022 (November 24, 2022): 1–9. http://dx.doi.org/10.1155/2022/8026280.
Full textCai, Jun, Jian-Zhen Luo, and Fangyuan Lei. "Analyzing Network Protocols of Application Layer Using Hidden Semi-Markov Model." Mathematical Problems in Engineering 2016 (2016): 1–14. http://dx.doi.org/10.1155/2016/9161723.
Full textDissertations / Theses on the topic "Protocol Reverse Engineering"
Greau-Hamard, Pierre-Samuel. "Contribution à l’apprentissage non supervisé de protocoles pour la couche de Liaison de données dans les systèmes communicants, à l'aide des Réseaux Bayésiens." Thesis, CentraleSupélec, 2021. http://www.theses.fr/2021CSUP0009.
Full textBossert, Georges. "Exploiting Semantic for the Automatic Reverse Engineering of Communication Protocols." Thesis, Supélec, 2014. http://www.theses.fr/2014SUPL0027/document.
Full textMcCulley, Shane. "Forensic Analysis of G Suite Collaborative Protocols." ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2386.
Full textGkaniatsou, Andriana Evgenia. "Analysis of low-level implementations of cryptographic protocols." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/29613.
Full textScarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.
Full textTien, Quan Bui, and 裴進軍. "ReFSM: Reverse Engineering from Protocol Traces to Test Generation by Extended Finite State Machines." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/3wq2xx.
Full textLiu, Yi-Jun, and 劉怡君. "The False-Dilemma Approach to Data Protocol Reverse Engineering for Diesel Engine Glow Plug with CAN Bus." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/u4yau2.
Full textChiu, Ling, and 邱陵. "The study of the reverse engineering for communication protocols." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/30179502443528436185.
Full textBook chapters on the topic "Protocol Reverse Engineering"
Duchêne, J., C. Le Guernic, E. Alata, V. Nicomette, and M. Kaâniche. "Protocol Reverse Engineering: Challenges and Obfuscation." In Lecture Notes in Computer Science. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54876-0_11.
Full textCai, Jun, Jian-Zhen Luo, Jianliang Ruan, and Yan Liu. "Toward Fuzz Test Based on Protocol Reverse Engineering." In Information Security Practice and Experience. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72359-4_56.
Full textChen, Yige, Tianning Zang, Yongzheng Zhang, Yuan Zhou, Peng Yang, and Yipeng Wang. "Inspector: A Semantics-Driven Approach to Automatic Protocol Reverse Engineering." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92635-9_21.
Full textLee, Choongin, Jeonghan Bae, and Heejo Lee. "PRETT: Protocol Reverse Engineering Using Binary Tokens and Network Traces." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99828-2_11.
Full textLi, Weiming, Meirong Ai, and Bo Jin. "A Network Protocol Reverse Engineering Method Based on Dynamic Taint Propagation Similarity." In Intelligent Computing Theories and Application. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-42291-6_58.
Full textAli, Mohammed Aamir, and Aad van Moorsel. "Designed to Be Broken: A Reverse Engineering Study of the 3D Secure 2.0 Payment Protocol." In Financial Cryptography and Data Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32101-7_13.
Full textLobo, Daniel. "Formalizing Phenotypes of Regeneration." In Methods in Molecular Biology. Springer US, 2022. http://dx.doi.org/10.1007/978-1-0716-2172-1_36.
Full text"An automatic network protocol reverse engineering method for vulnerability discovery." In Network Security and Communication Engineering. CRC Press, 2015. http://dx.doi.org/10.1201/b18660-14.
Full textFavre, Liliana Maria. "Non-Mobile Software Modernization in Accordance With the Principles of Model-Driven Engineering." In IoT Protocols and Applications for Improving Industry, Environment, and Society. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-6463-9.ch002.
Full textTu, Zhiying, Gregory Zacharewicz, and David Chen. "Harmonized and Reversible Development Framework for HLA based Interoperable Application." In Handbook of Research on E-Business Standards and Protocols. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0146-8.ch004.
Full textConference papers on the topic "Protocol Reverse Engineering"
Trifilo, Antonio, Stefan Burschka, and Ernst Biersack. "Traffic to protocol reverse engineering." In 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA). IEEE, 2009. http://dx.doi.org/10.1109/cisda.2009.5356565.
Full textHe, Yongjun, Hui Shu, and Xiaobing Xiong. "Protocol Reverse Engineering Based on DynamoRIO." In 2009 International Conference on Information and Multimedia Technology. IEEE, 2009. http://dx.doi.org/10.1109/icimt.2009.26.
Full textInsik Jung, Hyeonwoo Kim, Dong-Kweon Hong, and Hongtaek Ju. "Protocol Reverse Engineering to Facebook Messages." In 2013 Fourth International Conference on Intelligent Systems, Modelling and Simulation (ISMS 2013). IEEE, 2013. http://dx.doi.org/10.1109/isms.2013.30.
Full textTomicic, Igor, Petra Grd, and Markus Schatten. "Reverse Engineering of the MMORPG Client Protocol." In 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, 2019. http://dx.doi.org/10.23919/mipro.2019.8756873.
Full textKiechle, Valentin, Matthias Börsig, Sven Nitzsche, Ingmar Baumgart, and Jürgen Becker. "PREUNN: Protocol Reverse Engineering using Neural Networks." In 8th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2022. http://dx.doi.org/10.5220/0010813500003120.
Full textQuante, Jochen, and Rainer Koschke. "Dynamic Protocol Recovery." In 14th Working Conference on Reverse Engineering (WCRE 2007). IEEE, 2007. http://dx.doi.org/10.1109/wcre.2007.24.
Full textLei Ming and Zan Yuping. "Protocol reverse engineering and interference control of FLASHGET." In 2014 International Conference on Information and Communications Technologies (ICT 2014). Institution of Engineering and Technology, 2014. http://dx.doi.org/10.1049/cp.2014.0592.
Full textBossert, Georges, Frédéric Guihéry, and Guillaume Hiet. "Towards automated protocol reverse engineering using semantic information." In ASIA CCS '14: 9th ACM Symposium on Information, Computer and Communications Security. ACM, 2014. http://dx.doi.org/10.1145/2590296.2590346.
Full textLi, Haifeng, Bo Shuai, Jian Wang, and Chaojing Tang. "Protocol Reverse Engineering Using LDA and Association Analysis." In 2015 11th International Conference on Computational Intelligence and Security (CIS). IEEE, 2015. http://dx.doi.org/10.1109/cis.2015.83.
Full textYe, Yapeng, Zhuo Zhang, Fei Wang, Xiangyu Zhang, and Dongyan Xu. "NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces." In Network and Distributed System Security Symposium. Internet Society, 2021. http://dx.doi.org/10.14722/ndss.2021.24531.
Full text