A survey of automatic protocol reverse engineering tools

J Narayan, SK Shukla, TC Clancy - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Computer network protocols define the rules in which two entities communicate over a
network of unique hosts. Many protocol specifications are unknown, unavailable, or …

Survey of protocol reverse engineering algorithms: Decomposition of tools for static traffic analysis

S Kleber, L Maile, F Kargl - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Knowledge about a network protocol to understand the communication between entities is
necessary for vulnerability research, penetration testing, malware analysis, network …

Eavesdropping on {Fine-Grained} user activities within smartphone apps over encrypted network traffic

B Saltaformaggio, H Choi, K Johnson, Y Kwon… - 10th USENIX workshop …, 2016 - usenix.org
Smartphone apps have changed the way we interact with online services, but highly
specialized apps come at a cost to privacy. In this paper we will demonstrate that a passive …

Towards automated protocol reverse engineering using semantic information

G Bossert, F Guihéry, G Hiet - Proceedings of the 9th ACM symposium …, 2014 - dl.acm.org
Network security products, such as NIDS or application firewalls, tend to focus on application
level communication flows. However, adding support for new proprietary and often …

[PDF][PDF] NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces.

Y Ye, Z Zhang, F Wang, X Zhang, D Xu - NDSS, 2021 - cs.purdue.edu
Network protocol reverse engineering is an important challenge with many security
applications. A popular kind of method leverages network message traces. These methods …

A semantics-aware approach to the automated network protocol identification

X Yun, Y Wang, Y Zhang, Y Zhou - IEEE/ACM transactions on …, 2015 - ieeexplore.ieee.org
Traffic classification, a mapping of traffic to network applications, is important for a variety of
networking and security issues, such as network measurement, network monitoring, as well …

Towards self adaptive network traffic classification

A Tongaonkar, R Torres, M Iliofotou… - Computer …, 2015 - Elsevier
A critical aspect of network management from an operator's perspective is the ability to
understand or classify all traffic that traverses the network. The failure of port based traffic …

PREIUD: an industrial control protocols reverse engineering tool based on unsupervised learning and deep neural network methods

B Ning, X Zong, K He, L Lian - Symmetry, 2023 - mdpi.com
The security of industrial control systems relies on the communication and data exchange
capabilities provided by industrial control protocols, which can be complex, and may even …

$ Bitcoding $: Network traffic classification through encoded bit level signatures

N Hubballi, M Swarnkar - IEEE/ACM Transactions on …, 2018 - ieeexplore.ieee.org
With many network protocols using obfuscation techniques to hide their identity, robust
methods of traffic classification are required. In traditional deep-packet-inspection (DPI) …

Protocol reverse-engineering methods and tools: A survey

Y Huang, H Shu, F Kang, Y Guang - Computer Communications, 2022 - Elsevier
The widespread utilization of network protocols raises many security and privacy concerns.
To address them, protocol reverse-engineering (PRE) has been broadly applied in diverse …