State of the art of network protocol reverse engineering tools
Communication protocols enable structured information exchanges between different
entities. A description, at different levels of detail, is necessary for many applications, such …
entities. A description, at different levels of detail, is necessary for many applications, such …
Survey of protocol reverse engineering algorithms: Decomposition of tools for static traffic analysis
Knowledge about a network protocol to understand the communication between entities is
necessary for vulnerability research, penetration testing, malware analysis, network …
necessary for vulnerability research, penetration testing, malware analysis, network …
An experimental study of diversity with off-the-shelf antivirus engines
Fault tolerance in the form of diverse redundancy is well known to improve the detection
rates for both malicious and non-malicious failures. What is of interest to designers of …
rates for both malicious and non-malicious failures. What is of interest to designers of …
Diversity for security: a study with off-the-shelf antivirus engines
We have previously reported [1] the results of an exploratory analysis of the potential gains
in detection capability from using diverse AntiVirus products. The analysis was based on …
in detection capability from using diverse AntiVirus products. The analysis was based on …
Towards network containment in malware analysis systems
This paper focuses on the containment and control of the network interaction generated by
malware samples in dynamic analysis environments. A currently unsolved problem consists …
malware samples in dynamic analysis environments. A currently unsolved problem consists …
Contribution à la surveillance des systèmes de production à l'aide des réseaux de neurones dynamiques: Application à la e-maintenance
R Zemouri - 2003 - theses.hal.science
Les méthodes de surveillance industrielle sont divisées en deux catégories: méthodes de
surveillance avec modèle formel de l'équipement, et méthodes de surveillance sans modèle …
surveillance avec modèle formel de l'équipement, et méthodes de surveillance sans modèle …
Diversity-by-design for dependable and secure cyber-physical systems: A survey
Diversity-based security approaches have been studied for several decades since the
1970s. The concept of diversity-by-design emerged in the 1980s. Since then, diversity …
1970s. The concept of diversity-by-design emerged in the 1980s. Since then, diversity …
Heuristics-based protocol labeling for industrial control systems
(57) ABSTRACT A method for learning aspects of messages in an industrial control system
is provided. The method includes obtaining a plurality of messages. The method includes …
is provided. The method includes obtaining a plurality of messages. The method includes …
Automation of the reverse engineering of unknown binary network protocols
S Kleber - 2024 - oparu.uni-ulm.de
In an interconnected world, comprehending communication systems is imperative yet
challenging for undisclosed protocols. Protocol reverse engineering (PRE) is the process of …
challenging for undisclosed protocols. Protocol reverse engineering (PRE) is the process of …
Server-side code injection attacks: A historical perspective
Server-side code injection attacks used to be one of the main culprits for the spread of
malware. A vast amount of research has been devoted to the problem of effectively detecting …
malware. A vast amount of research has been devoted to the problem of effectively detecting …