Text mining in cybersecurity: A systematic literature review

L Ignaczak, G Goldschmidt, CAD Costa… - ACM Computing …, 2021 - dl.acm.org
The growth of data volume has changed cybersecurity activities, demanding a higher level
of automation. In this new cybersecurity landscape, text mining emerged as an alternative to …

A survey on the development of network protocol fuzzing techniques

Z Zhang, H Zhang, J Zhao, Y Yin - Electronics, 2023 - mdpi.com
Network protocols, as the communication rules among computer network devices, are the
foundation for the normal operation of networks. However, security issues arising from …

[PDF][PDF] NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces.

Y Ye, Z Zhang, F Wang, X Zhang, D Xu - NDSS, 2021 - cs.purdue.edu
Network protocol reverse engineering is an important challenge with many security
applications. A popular kind of method leverages network message traces. These methods …

Automated attack synthesis by extracting finite state machines from protocol specification documents

ML Pacheco, M von Hippel, B Weintraub… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Automated attack discovery techniques, such as attacker synthesis or model-based fuzzing,
provide powerful ways to ensure network protocols operate correctly and securely. Such …

Sherlock on Specs: Building {LTE} Conformance Tests through Automated Reasoning

Y Chen, D Tang, Y Yao, M Zha, XF Wang… - 32nd USENIX Security …, 2023 - usenix.org
Conformance tests are critical for finding security weaknesses in carrier network systems.
However, building a conformance test procedure from specifications is challenging, as …

SGPFuzzer: A state-driven smart graybox protocol fuzzer for network protocol implementations

Y Yu, Z Chen, S Gan, X Wang - IEEE Access, 2020 - ieeexplore.ieee.org
As one of the most widely used technologies in software testing, fuzzing technology has
been applied to network protocol vulnerability detection, and various network protocol …

ProsegDL: Binary protocol format extraction by deep learning-based field boundary identification

S Zhao, J Wang, S Yang, Y Zeng… - 2022 IEEE 30th …, 2022 - ieeexplore.ieee.org
Protocol reverse engineering can be applied to various security applications, including
fuzzing, malware analysis, and intrusion detection. It aims to acquire an unknown protocol's …

Model‐Based Grey‐Box Fuzzing of Network Protocols

Y Pan, W Lin, L Jiao, Y Zhu - Security and Communication …, 2022 - Wiley Online Library
The widely used network protocols play a crucial role in various systems. However, the
protocol vulnerabilities caused by the design of the network protocol or its implementation by …

A Survey of Protocol Fuzzing

X Zhang, C Zhang, X Li, Z Du, Y Li, Y Zheng… - arXiv preprint arXiv …, 2024 - arxiv.org
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …

A Novel Network Protocol Syntax Extracting Method for Grammar-Based Fuzzing

H Li, L Zhang, D Zhao, L Xu, X Li, S Yang, X Han - Applied Sciences, 2024 - mdpi.com
Network protocol syntax information plays a crucial role in grammar-based fuzzing. Current
network protocol syntax extraction methods are less versatile, inefficient, and the extracted …