Comparative Analysis of the Status of the Network Protocol Reverse Engineering

Article Preview

Abstract:

In order to quickly grasp the actual situation of the current protocol reverse solution, commonly used terms first collection protocol reverse engineering field, to describe the protocol reverse engineering and the formal definition of the protocol reverse reference model; then summarizes the existing protocol reverse solution in the main analysis techniques and algorithms, and discusses the application fields of reverse technology protocol; finally describes between actual situation and the ideal current protocol reverse engineering of the gap, and points out the defects existing in the current scheme monk unsolved problems, explore new directions for future research.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

722-726

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] E. J. Schwartz, T. Avgerinos, D. Brumley. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask). In: Proceedings of 2010 IEEE Symposium on Security and Privacy, (2010).

DOI: 10.1109/sp.2010.26

Google Scholar

[2] M. E. Deyoung. Dynamic Protocol Reverse Engineering: A Grammatical Inference Approach. Air Force Institute, (2008).

Google Scholar

[3] G. Wondracek, P. M. Comparetti, C. Kruegel, E. Kirda. Automatic Network Protocol Analysis. In: Proceedings of the 15th Annual Network and Distributed System Security Symposium, February (2008).

DOI: 10.1109/sp.2009.14

Google Scholar

[4] P.M. Comparetti, G. Wondracek, C. Kruegel, E. Kirda. Prospex: Protocol Specification Extraction. In: Proceedings of 2009 IEEE Symposium on Security and Privacy, Oakland, CA , May (2009).

DOI: 10.1109/sp.2009.14

Google Scholar

[5] Juan Caballero, Pongsin Poosankam, Christian Kreibich, Dawn Song. Dispatcher: Enabling Active Botnet Infiltration using Automatic Protocol Reverse-Engineering. In: Proceedings of the 16th ACM Conferences on Computer and Communication Security, (2009).

DOI: 10.1145/1653662.1653737

Google Scholar