최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기KSII Transactions on internet and information systems : TIIS, v.14 no.11, 2020년, pp.4310 - 4330
Goo, Young-Hoon (Advanced KREONET Center, Korea Institute of Science and Technology Information) , Shim, Kyu-Seok (Advanced KREONET Center, Korea Institute of Science and Technology Information) , Baek, Ui-Jun (Department of Computer and Information Science, Korea University) , Kim, Myung-Sup (Department of Computer and Information Science, Korea University)
With the continuous emergence of new applications and cyberattacks and their frequent updates, the need for automatic protocol reverse engineering is gaining recognition. Although several methods for automatic protocol reverse engineering have been proposed, each method still faces major limitations...
Cisco VNI, "Cisco Visual Networking Index: Forecast and Methodology, 2016-2017," Cisco, CA, USA, White Paper C11-481360-01, June. 2017.
M. Kuzin, Y. Shmelev, and V. Kuskov, "New trends in the world of IoT threats," Kaspersky Lab, Sep. 2018.
A. Tridgell, "How Samba was written," August 2003 [Online]. Available: http://samba.org/ftp/tridge/misc/french_cafe.txt
B. D. Sija, Y.-H. Goo, K.-S. Shim, H. Hasanova, and M.-S. Kim, "A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View," Security and Communication Networks, vol. 2018, Article ID 8370341, pp. 1-17, February 2018.
J. Cai, J.-Z. Luo, and F. Lei, "Analyzing Network Protocols of Application Layer Using Hidden Semi-Markov Model," Mathematical Problems in Engineering, vol. 2016, Article ID 9161723, pp. 1-14, March 2016.
J. Caballero, H. Yin, Z. Liang, and D. Song, "Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis," in Proc. of 14th ACM Conf. on Computer and Communications Security (CCS), pp. 317-329, October 2007.
W. Cui, M. Peinado, K. Chen, H. J. Wang, and L. Irun-Briz, "Tupni: Automatic Reverse Engineering of Input Formats," in Proc. of 15th ACM Conf. on Computer and Communications Security (CCS), Ocober 2008.
P. M. Comparetti, G. Wondracek, C. Kruegel, and E. Kirda, "Prospex: Protocol Specification Extraction," in Proc. of 30th IEEE Symposium on Security and Privacy, pp. 110-125, May 2009.
J. Caballero and D. Song, "Automatic Protocol Reverse-Engineering: Message Format Extraction and Field Semantics Inference," Computer Networks, vol. 57, no. 2, pp. 451-474, 2013.
M. A. Beddoe, "The Protocol Informatics Project," 2004 [Online]. Available: http://www.4tphi.net/-awalters/PI/PI.html
C. Leita, K. Mermoud, and M. Dacier, "ScriptGen: an Automated Script Generation Tool for Honeyd," in Proc. of 21st Annual Computer Security Applications Conf., December 2005.
W. Cui, V. Paxson, N. C. Weaver, and R. H. Katz, "Protocol-Independent Adaptive Replay of Application Dialog," in Proc. 13th Symposium on Network and Distributed System Security (NDSS), February 2006.
J.-Z. Luo and S.-Z. Yu, "Position-based Automatic Reverse Engineering of Network Protocols," J. Network and Computer Applications, vol. 36, no. 3, pp. 1070-1077, May 2013.
Y. Wang, N. Zhang, Y.-M. Wu, B.-B. Su, and Y.-J. Liao, "Protocol Formats Reverse Engineering Based on Association Rules in Wireless Environment," in Proc. of 12th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communication, pp. 134-141, July 2013.
R. Ji, H. Li, and C. Tang, "Extracting Keywords of UAVs Wireless Communication Protocols Based on Association Rules Learning," in Proc. of 12th IEEE Int. Conf. on Computational Intelligence and Security, pp. 310-313, December 2016.
Z. Lin, X. Jiang, D. Xu, and X. Zhang, "Automatic Protocol Reverse Engineering through Context-Aware Monitored Execution," in Proc. of Network and Distributed System Security Symposium (NDSS), February 2008.
Z. Wang, X. Jiang, W. Cui, X. Wang, and M. Grace, "ReFormat: Automatic Reverse Engineering of Encrypted Messages," in Proc. of Computer Security - ESORICS 2009, in Proc. 14th European Symposium on Research in Computer Security, pp. 200-215, September 2009.
W. Cui, J. Kannan, and H. J. Wang, "Discoverer: Automatic Protocol Reverse Engineering from Network Traces," in Proc. of 16th USENIX Security Symposium, pp. 1-14, August 2007.
M. Shevertalov and S. Mancoridis, "A Reverse Engineering Tool for Extracting Protocols of Networked Applications," in Proc. of 14th Working Conf. on Reverse Engineering (WCRE), pp. 229-238, October 2007.
A. Trifilo, S. Burschka, and E. Biersack, "Traffic to protocol reverse engineering," in Proc. of IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1-8, July 2009.
Y. Wang, X. Li, J. Meng, Y. Zhao, Z. Zhang, and L. Guo, "Biprominer: automatic mining of binary protocol features," in Proc. of 12th Int. Conf. on Parallel and Distributed Computing, Applications and Technologies (PDCAT), pp. 179-184, October 2011.
J. Antunes, N. Neves, and P. Verissimo, "Reverse Engineering of Protocols from Network Traces," in Proc. of 18th Working Conf. on Reverse Engineering (WCRE), pp.169-178, October 2011.
Y. Wang, Z. Zhang, D. D. Yao, B. Qu, and L. Guo, "Inferring Protocol State Machine from Network Traces: a Probabilistic Approach," in Proc. of 9th Applied Cryptography and Network Security Int. Conf. (ACNS), pp. 1-18, 2011.
G. Bossert, F. Guihery, and G. Hiet, "Towards Automated Protocol Reverse Engineering using Semantic Information," in Proc. of 9th ACM Symposium on Information, Computer and Communications Security, pp. 51-62, June 2014.
I. Bermudez, A. Tongaonkar, M. Iliofotou, M. Mellia, and M. M. Munafo, "Automatic Protocol Field Inference for Deeper Protocol Understanding," in Proc. of 14th IFIP Networking Conf., pp. 1-9, May 2015.
K. Choi, Y. Son, J. Noh, H. Shin, J. Choi, and Y. Kim, "Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4," in Proc. of 9th ACM Conf. on Security and Privacy in Wireless and Mobile Networks, pp. 183-193, July 2016.
G. Ladi, L. Buttyan, and T. Holczer, "Message format and field semantics inference for binary protocols using recorded network traffic," in Proc. of 26th Int. Conf. Software, Telecommunication Computer Networks (SoftCom), September 13-15, 2018.
M. Marchetti and D. Stabili, "READ: Reverse Engineering of Automotive Data Frames," IEEE Transactions on Information Forensics and Security, vol. 14, no. 4, pp. 1083-1097, September 2018.
Graphviz - Graph Visualization Software. Available: https://graphviz.org/
해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.