The threat of offensive ai to organizations

Y Mirsky, A Demontis, J Kotak, R Shankar, D Gelei… - Computers & …, 2023 - Elsevier
AI has provided us with the ability to automate tasks, extract information from vast amounts of
data, and synthesize media that is nearly indistinguishable from the real thing. However …

A survey of automatic protocol reverse engineering tools

J Narayan, SK Shukla, TC Clancy - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Computer network protocols define the rules in which two entities communicate over a
network of unique hosts. Many protocol specifications are unknown, unavailable, or …

Flow-level state transition as a new switch primitive for SDN

M Moshref, A Bhargava, A Gupta, M Yu… - Proceedings of the third …, 2014 - dl.acm.org
In software-defined networking, the controller installs flow-based rules at switches either
proactively or reactively. The reactive approach allows controller applications to make …

Eavesdropping on {Fine-Grained} user activities within smartphone apps over encrypted network traffic

B Saltaformaggio, H Choi, K Johnson, Y Kwon… - 10th USENIX workshop …, 2016 - usenix.org
Smartphone apps have changed the way we interact with online services, but highly
specialized apps come at a cost to privacy. In this paper we will demonstrate that a passive …

A semantics aware approach to automated reverse engineering unknown protocols

Y Wang, X Yun, MZ Shafiq, L Wang… - 2012 20th IEEE …, 2012 - ieeexplore.ieee.org
Extracting the protocol message format specifications of unknown applications from network
traces is important for a variety of applications such as application protocol parsing …

Ggfast: Automating generation of flexible network traffic classifiers

J Piet, D Nwoji, V Paxson - Proceedings of the ACM SIGCOMM 2023 …, 2023 - dl.acm.org
When employing supervised machine learning to analyze network traffic, the heart of the
task often lies in developing effective features for the ML to leverage. We develop GGFAST …

Towards automated protocol reverse engineering using semantic information

G Bossert, F Guihéry, G Hiet - Proceedings of the 9th ACM symposium …, 2014 - dl.acm.org
Network security products, such as NIDS or application firewalls, tend to focus on application
level communication flows. However, adding support for new proprietary and often …

Model learning and model checking of SSH implementations

P Fiterău-Broştean, T Lenaerts, E Poll… - Proceedings of the 24th …, 2017 - dl.acm.org
We apply model learning on three SSH implementations to infer state machine models, and
then use model checking to verify that these models satisfy basic security properties and …

[PDF][PDF] NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces.

Y Ye, Z Zhang, F Wang, X Zhang, D Xu - NDSS, 2021 - cs.purdue.edu
Network protocol reverse engineering is an important challenge with many security
applications. A popular kind of method leverages network message traces. These methods …

State of the art of network protocol reverse engineering tools

J Duchêne, C Le Guernic, E Alata, V Nicomette… - Journal of Computer …, 2018 - Springer
Communication protocols enable structured information exchanges between different
entities. A description, at different levels of detail, is necessary for many applications, such …