A survey of honeypots and honeynets for internet of things, industrial internet of things, and cyber-physical systems

J Franco, A Aris, B Canberk… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical
Systems (CPS) have become essential for our daily lives in contexts such as our homes …

Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization

C Fachkha, M Debbabi - IEEE Communications Surveys & …, 2015 - ieeexplore.ieee.org
Today, the Internet security community largely emphasizes cyberspace monitoring for the
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …

Polyglot: Automatic extraction of protocol message format using dynamic binary analysis

J Caballero, H Yin, Z Liang, D Song - … of the 14th ACM conference on …, 2007 - dl.acm.org
Protocol reverse engineering, the process of extracting the application-level protocol used
by an implementation, without access to the protocol specification, is important for many …

[PDF][PDF] Discoverer: Automatic Protocol Reverse Engineering from Network Traces.

W Cui, J Kannan, HJ Wang - USENIX Security Symposium, 2007 - usenix.org
Application-level protocol specifications are useful for many security applications, including
intrusion prevention and detection that performs deep packet inspection and traffic …

[PDF][PDF] Iotcandyjar: Towards an intelligent-interaction honeypot for iot devices

T Luo, Z Xu, X Jin, Y Jia, X Ouyang - Black Hat, 2017 - blackhat.com
In recent years, the emerging Internet-of-Things (IoT) has led to concerns about the security
of networked embedded devices. There is a strong need to develop suitable and …

Prospex: Protocol specification extraction

PM Comparetti, G Wondracek… - 2009 30th IEEE …, 2009 - ieeexplore.ieee.org
Protocol reverse engineering is the process of extracting application-level specifications for
network protocols. Such specifications are very useful in a number of security-related …

Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering

J Caballero, P Poosankam, C Kreibich… - Proceedings of the 16th …, 2009 - dl.acm.org
Automatic protocol reverse-engineering is important for many security applications,
including the analysis and defense against botnets. Understanding the command-and …

[PDF][PDF] Automatic protocol format reverse engineering through context-aware monitored execution.

Z Lin, X Jiang, D Xu, X Zhang - NDSS, 2008 - ndss-symposium.org
Protocol reverse engineering has often been a manual process that is considered time-
consuming, tedious and error-prone. To address this limitation, a number of solutions have …

Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols

H Gascon, C Wressnegger, F Yamaguchi, D Arp… - Security and Privacy in …, 2015 - Springer
The security of network services and their protocols critically depends on minimizing their
attack surface. A single flaw in an implementation can suffice to compromise a service and …

Tupni: Automatic reverse engineering of input formats

W Cui, M Peinado, K Chen, HJ Wang… - Proceedings of the 15th …, 2008 - dl.acm.org
Recent work has established the importance of automatic reverse engineering of protocol or
file format specifications. However, the formats reverse engineered by previous tools have …