Protocol reverse-engineering methods and tools: A survey

Y Huang, H Shu, F Kang, Y Guang - Computer Communications, 2022 - Elsevier
The widespread utilization of network protocols raises many security and privacy concerns.
To address them, protocol reverse-engineering (PRE) has been broadly applied in diverse …

A survey on fuzz testing technologies for industrial control protocols

X Wei, Z Yan, X Liang - Journal of Network and Computer Applications, 2024 - Elsevier
The development of the industrial Internet of Things enables industrial control systems to
become inter-networked and inter-connected, making them intelligent with high productivity …

Bleem: Packet sequence oriented fuzzing for protocol implementations

Z Luo, J Yu, F Zuo, J Liu, Y Jiang, T Chen… - 32nd USENIX Security …, 2023 - usenix.org
Protocol implementations are essential components in network infrastructures. Flaws hidden
in the implementations can easily render devices vulnerable to adversaries. Therefore …

[PDF][PDF] DynPRE: Protocol reverse engineering via dynamic inference

Z Luo, K Liang, Y Zhao, F Wu, J Yu, H Shi, Y Jiang - Proc. NDSS, 2024 - fouzhe.github.io
Automatic protocol reverse engineering is essential for various security applications. While
many existing techniques achieve this task by analyzing static network traces, they face …

Demystifying the Security Implications in {IoT} Device Rental Services

Y He, Y Guan, R Lun, S Song, Z Guo, J Zhuge… - 33rd USENIX Security …, 2024 - usenix.org
Nowadays, unattended device rental services with cellular IoT controllers, such as e-
scooters and EV chargers, are widely deployed in public areas around the world, offering …

Ics3fuzzer: A framework for discovering protocol implementation bugs in ics supervisory software by fuzzing

D Fang, Z Song, L Guan, P Liu, A Peng… - Proceedings of the 37th …, 2021 - dl.acm.org
The supervisory software is widely used in industrial control systems (ICSs) to manage field
devices such as PLC controllers. Once compromised, it could be misused to control or …

[HTML][HTML] Pree: Heuristic builder for reverse engineering of network protocols in industrial control systems

SA Qasim, W Jo, I Ahmed - Forensic Science International: Digital …, 2023 - Elsevier
Industrial control systems (ICS) play a critical role in the operation of our vital infrastructures.
They consist of field sites and a control center, with programmable logic controllers (PLCs) …

[PDF][PDF] BinaryInferno: A Semantic-Driven Approach to Field Inference for Binary Message Formats.

J Chandler, A Wick, K Fisher - NDSS, 2023 - ndss-symposium.org
We present BinaryInferno, a fully automatic tool for reverse engineering binary message
formats. Given a set of messages with the same format, the tool uses an ensemble of …

Extracting protocol format as state machine via controlled static loop analysis

Q Shi, X Xu, X Zhang - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
Reverse engineering of protocol message formats is critical for many security applications.
Mainstream techniques use dynamic analysis and inherit its low-coverage problem—the …

SePanner: Analyzing Semantics of Controller Variables in Industrial Control Systems based on Network Traffic

J Meng, Z Yang, Z Zhang, Y Geng, R Deng… - Proceedings of the 39th …, 2023 - dl.acm.org
Programmable logic controllers (PLCs), the essential components of critical infrastructure,
play a crucial role in various industrial manufacturing processes. Recent attack events show …