State of the art of network protocol reverse engineering tools

J Duchêne, C Le Guernic, E Alata, V Nicomette… - Journal of Computer …, 2018 - Springer
Communication protocols enable structured information exchanges between different
entities. A description, at different levels of detail, is necessary for many applications, such …

Survey of protocol reverse engineering algorithms: Decomposition of tools for static traffic analysis

S Kleber, L Maile, F Kargl - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Knowledge about a network protocol to understand the communication between entities is
necessary for vulnerability research, penetration testing, malware analysis, network …

An experimental study of diversity with off-the-shelf antivirus engines

I Gashi, V Stankovic, C Leita… - 2009 Eighth IEEE …, 2009 - ieeexplore.ieee.org
Fault tolerance in the form of diverse redundancy is well known to improve the detection
rates for both malicious and non-malicious failures. What is of interest to designers of …

Diversity for security: a study with off-the-shelf antivirus engines

P Bishop, R Bloomfield, I Gashi… - 2011 IEEE 22nd …, 2011 - ieeexplore.ieee.org
We have previously reported [1] the results of an exploratory analysis of the potential gains
in detection capability from using diverse AntiVirus products. The analysis was based on …

Towards network containment in malware analysis systems

M Graziano, C Leita, D Balzarotti - … of the 28th Annual Computer Security …, 2012 - dl.acm.org
This paper focuses on the containment and control of the network interaction generated by
malware samples in dynamic analysis environments. A currently unsolved problem consists …

Contribution à la surveillance des systèmes de production à l'aide des réseaux de neurones dynamiques: Application à la e-maintenance

R Zemouri - 2003 - theses.hal.science
Les méthodes de surveillance industrielle sont divisées en deux catégories: méthodes de
surveillance avec modèle formel de l'équipement, et méthodes de surveillance sans modèle …

Diversity-by-design for dependable and secure cyber-physical systems: A survey

Q Zhang, AZ Mohammed, Z Wan… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Diversity-based security approaches have been studied for several decades since the
1970s. The concept of diversity-by-design emerged in the 1980s. Since then, diversity …

Heuristics-based protocol labeling for industrial control systems

C Leita, M Dacier - US Patent 9,384,066, 2016 - Google Patents
(57) ABSTRACT A method for learning aspects of messages in an industrial control system
is provided. The method includes obtaining a plurality of messages. The method includes …

Automation of the reverse engineering of unknown binary network protocols

S Kleber - 2024 - oparu.uni-ulm.de
In an interconnected world, comprehending communication systems is imperative yet
challenging for undisclosed protocols. Protocol reverse engineering (PRE) is the process of …

Server-side code injection attacks: A historical perspective

J Fritz, C Leita, M Polychronakis - International Workshop on Recent …, 2013 - Springer
Server-side code injection attacks used to be one of the main culprits for the spread of
malware. A vast amount of research has been devoted to the problem of effectively detecting …