A survey of automatic protocol reverse engineering tools

J Narayan, SK Shukla, TC Clancy - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Computer network protocols define the rules in which two entities communicate over a
network of unique hosts. Many protocol specifications are unknown, unavailable, or …

State of the art of network protocol reverse engineering tools

J Duchêne, C Le Guernic, E Alata, V Nicomette… - Journal of Computer …, 2018 - Springer
Communication protocols enable structured information exchanges between different
entities. A description, at different levels of detail, is necessary for many applications, such …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification

C Dong, C Zhang, Z Lu, B Liu, B Jiang - Computer Networks, 2020 - Elsevier
Encrypted traffic classification is of great significance for advanced network services. Though
encryption methods seem unbroken in protecting users' privacy, existing studies have …

Quality-aware and fine-grained incentive mechanisms for mobile crowdsensing

J Wang, J Tang, D Yang, E Wang… - 2016 IEEE 36th …, 2016 - ieeexplore.ieee.org
Limited research efforts have been made for Mobile CrowdSensing (MCS) to address quality
of the recruited crowd, ie, quality of services/data each individual mobile user and the whole …

Protocol reverse-engineering methods and tools: A survey

Y Huang, H Shu, F Kang, Y Guang - Computer Communications, 2022 - Elsevier
The widespread utilization of network protocols raises many security and privacy concerns.
To address them, protocol reverse-engineering (PRE) has been broadly applied in diverse …

Survey of protocol reverse engineering algorithms: Decomposition of tools for static traffic analysis

S Kleber, L Maile, F Kargl - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Knowledge about a network protocol to understand the communication between entities is
necessary for vulnerability research, penetration testing, malware analysis, network …

A survey of automatic protocol reverse engineering approaches, methods, and tools on the inputs and outputs view

BD Sija, YH Goo, KS Shim… - Security and …, 2018 - Wiley Online Library
A network protocol defines rules that control communications between two or more
machines on the Internet, whereas Automatic Protocol Reverse Engineering (APRE) defines …

Sepanner: Analyzing semantics of controller variables in industrial control systems based on network traffic

J Meng, Z Yang, Z Zhang, Y Geng, R Deng… - Proceedings of the 39th …, 2023 - dl.acm.org
Programmable logic controllers (PLCs), the essential components of critical infrastructure,
play a crucial role in various industrial manufacturing processes. Recent attack events show …

[PDF][PDF] Automated cross-platform reverse engineering of CAN bus commands from mobile apps

H Wen, Q Zhao, QA Chen, Z Lin - Proceedings 2020 Network and …, 2020 - par.nsf.gov
In modern automobiles, CAN bus commands are necessary for a wide range of applications
such as diagnosis, security monitoring, and recently autonomous driving. However, only a …