A survey of automatic protocol reverse engineering tools

J Narayan, SK Shukla, TC Clancy - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Computer network protocols define the rules in which two entities communicate over a
network of unique hosts. Many protocol specifications are unknown, unavailable, or …

Grammar-based whitebox fuzzing

P Godefroid, A Kiezun, MY Levin - Proceedings of the 29th ACM …, 2008 - dl.acm.org
Whitebox fuzzing is a form of automatic dynamic test generation, based on symbolic
execution and constraint solving, designed for security testing of large applications …

Protocol reverse-engineering methods and tools: A survey

Y Huang, H Shu, F Kang, Y Guang - Computer Communications, 2022 - Elsevier
The widespread utilization of network protocols raises many security and privacy concerns.
To address them, protocol reverse-engineering (PRE) has been broadly applied in diverse …

Polyglot: Automatic extraction of protocol message format using dynamic binary analysis

J Caballero, H Yin, Z Liang, D Song - … of the 14th ACM conference on …, 2007 - dl.acm.org
Protocol reverse engineering, the process of extracting the application-level protocol used
by an implementation, without access to the protocol specification, is important for many …

[PDF][PDF] Discoverer: Automatic Protocol Reverse Engineering from Network Traces.

W Cui, J Kannan, HJ Wang - USENIX Security Symposium, 2007 - usenix.org
Application-level protocol specifications are useful for many security applications, including
intrusion prevention and detection that performs deep packet inspection and traffic …

Prospex: Protocol specification extraction

PM Comparetti, G Wondracek… - 2009 30th IEEE …, 2009 - ieeexplore.ieee.org
Protocol reverse engineering is the process of extracting application-level specifications for
network protocols. Such specifications are very useful in a number of security-related …

Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering

J Caballero, P Poosankam, C Kreibich… - Proceedings of the 16th …, 2009 - dl.acm.org
Automatic protocol reverse-engineering is important for many security applications,
including the analysis and defense against botnets. Understanding the command-and …

[PDF][PDF] Automatic protocol format reverse engineering through context-aware monitored execution.

Z Lin, X Jiang, D Xu, X Zhang - NDSS, 2008 - ndss-symposium.org
Protocol reverse engineering has often been a manual process that is considered time-
consuming, tedious and error-prone. To address this limitation, a number of solutions have …

Tupni: Automatic reverse engineering of input formats

W Cui, M Peinado, K Chen, HJ Wang… - Proceedings of the 15th …, 2008 - dl.acm.org
Recent work has established the importance of automatic reverse engineering of protocol or
file format specifications. However, the formats reverse engineered by previous tools have …

Inference and analysis of formal models of botnet command and control protocols

CY Cho, D Babi ć, ECR Shin, D Song - … of the 17th ACM conference on …, 2010 - dl.acm.org
We propose a novel approach to infer protocol state machines in the realistic high-latency
network setting, and apply it to the analysis of botnet Command and Control (C &C) …