Computer network protocols define the rules in which two entities communicate over a network of unique hosts. Many protocol specifications are unknown, unavailable, or …
M Moshref, A Bhargava, A Gupta, M Yu… - Proceedings of the third …, 2014 - dl.acm.org
In software-defined networking, the controller installs flow-based rules at switches either proactively or reactively. The reactive approach allows controller applications to make …
Smartphone apps have changed the way we interact with online services, but highly specialized apps come at a cost to privacy. In this paper we will demonstrate that a passive …
Extracting the protocol message format specifications of unknown applications from network traces is important for a variety of applications such as application protocol parsing …
J Piet, D Nwoji, V Paxson - Proceedings of the ACM SIGCOMM 2023 …, 2023 - dl.acm.org
When employing supervised machine learning to analyze network traffic, the heart of the task often lies in developing effective features for the ML to leverage. We develop GGFAST …
G Bossert, F Guihéry, G Hiet - Proceedings of the 9th ACM symposium …, 2014 - dl.acm.org
Network security products, such as NIDS or application firewalls, tend to focus on application level communication flows. However, adding support for new proprietary and often …
We apply model learning on three SSH implementations to infer state machine models, and then use model checking to verify that these models satisfy basic security properties and …
Network protocol reverse engineering is an important challenge with many security applications. A popular kind of method leverages network message traces. These methods …
J Duchêne, C Le Guernic, E Alata, V Nicomette… - Journal of Computer …, 2018 - Springer
Communication protocols enable structured information exchanges between different entities. A description, at different levels of detail, is necessary for many applications, such …