Survey of protocol reverse engineering algorithms: Decomposition of tools for static traffic analysis

S Kleber, L Maile, F Kargl - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Knowledge about a network protocol to understand the communication between entities is
necessary for vulnerability research, penetration testing, malware analysis, network …

[HTML][HTML] Multilayer detection of network steganography

M Smolarczyk, K Szczypiorski, J Pawluk - Electronics, 2020 - mdpi.com
This paper presents a new method for steganography detection in network protocols. The
method is based on a multilayer approach for the selective analysis of derived and …

On Specification-based Cyber-Attack Detection in Smart Grids

ÖSD van der Velde, M Lühman, F Sprünken… - arXiv preprint arXiv …, 2022 - arxiv.org
The transformation of power grids into intelligent cyber-physical systems brings numerous
benefits, but also significantly increases the surface for cyber-attacks, demanding …

Automation of the reverse engineering of unknown binary network protocols

S Kleber - 2024 - oparu.uni-ulm.de
In an interconnected world, comprehending communication systems is imperative yet
challenging for undisclosed protocols. Protocol reverse engineering (PRE) is the process of …

[HTML][HTML] On specification-based cyber-attack detection in smart grids

Ö Sen, D van der Velde, M Lühman, F Sprünken… - Energy …, 2022 - Springer
The transformation of power grids into intelligent cyber-physical systems brings numerous
benefits, but also significantly increases the surface for cyber-attacks, demanding …