Protocol reverse-engineering methods and tools: A survey
Y Huang, H Shu, F Kang, Y Guang - Computer Communications, 2022 - Elsevier
The widespread utilization of network protocols raises many security and privacy concerns.
To address them, protocol reverse-engineering (PRE) has been broadly applied in diverse …
To address them, protocol reverse-engineering (PRE) has been broadly applied in diverse …
A survey on fuzz testing technologies for industrial control protocols
The development of the industrial Internet of Things enables industrial control systems to
become inter-networked and inter-connected, making them intelligent with high productivity …
become inter-networked and inter-connected, making them intelligent with high productivity …
Bleem: Packet sequence oriented fuzzing for protocol implementations
Protocol implementations are essential components in network infrastructures. Flaws hidden
in the implementations can easily render devices vulnerable to adversaries. Therefore …
in the implementations can easily render devices vulnerable to adversaries. Therefore …
[PDF][PDF] DynPRE: Protocol reverse engineering via dynamic inference
Automatic protocol reverse engineering is essential for various security applications. While
many existing techniques achieve this task by analyzing static network traces, they face …
many existing techniques achieve this task by analyzing static network traces, they face …
Demystifying the Security Implications in {IoT} Device Rental Services
Y He, Y Guan, R Lun, S Song, Z Guo, J Zhuge… - 33rd USENIX Security …, 2024 - usenix.org
Nowadays, unattended device rental services with cellular IoT controllers, such as e-
scooters and EV chargers, are widely deployed in public areas around the world, offering …
scooters and EV chargers, are widely deployed in public areas around the world, offering …
Ics3fuzzer: A framework for discovering protocol implementation bugs in ics supervisory software by fuzzing
The supervisory software is widely used in industrial control systems (ICSs) to manage field
devices such as PLC controllers. Once compromised, it could be misused to control or …
devices such as PLC controllers. Once compromised, it could be misused to control or …
[HTML][HTML] Pree: Heuristic builder for reverse engineering of network protocols in industrial control systems
Industrial control systems (ICS) play a critical role in the operation of our vital infrastructures.
They consist of field sites and a control center, with programmable logic controllers (PLCs) …
They consist of field sites and a control center, with programmable logic controllers (PLCs) …
[PDF][PDF] BinaryInferno: A Semantic-Driven Approach to Field Inference for Binary Message Formats.
We present BinaryInferno, a fully automatic tool for reverse engineering binary message
formats. Given a set of messages with the same format, the tool uses an ensemble of …
formats. Given a set of messages with the same format, the tool uses an ensemble of …
Extracting protocol format as state machine via controlled static loop analysis
Reverse engineering of protocol message formats is critical for many security applications.
Mainstream techniques use dynamic analysis and inherit its low-coverage problem—the …
Mainstream techniques use dynamic analysis and inherit its low-coverage problem—the …
SePanner: Analyzing Semantics of Controller Variables in Industrial Control Systems based on Network Traffic
Programmable logic controllers (PLCs), the essential components of critical infrastructure,
play a crucial role in various industrial manufacturing processes. Recent attack events show …
play a crucial role in various industrial manufacturing processes. Recent attack events show …