2015
DOI: 10.1145/2840724
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Automatic Protocol Reverse Engineering Tools

Abstract: Computer network protocols define the rules in which two entities communicate over a network of unique hosts. Many protocol specifications are unknown, unavailable, or minimally documented, which prevents thorough analysis of the protocol for security purposes. For example, modern botnets often use undocumented and unique application-layer communication protocols to maintain command and control over numerous distributed hosts. Inferring the specification of closed protocols has numerous advantages, such as int… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 69 publications
(41 citation statements)
references
References 36 publications
0
40
0
1
Order By: Relevance
“…The idea of using regular inference to analyse implementations of security protocols dates back to at least Shu and Lee [19]. An extensive survey of this and other techniques to reverse engineer protocol implementations has been given by Narayan et al [20].…”
Section: Related Work In Protocol State Fuzzingmentioning
confidence: 99%
“…The idea of using regular inference to analyse implementations of security protocols dates back to at least Shu and Lee [19]. An extensive survey of this and other techniques to reverse engineer protocol implementations has been given by Narayan et al [20].…”
Section: Related Work In Protocol State Fuzzingmentioning
confidence: 99%
“…This method is especially useful when a file to execute the protocol is unavailable because it only requires a system implementing the protocol to be running, even if it is not running locally. The work in [13] surveys Automatic Protocol Reverse Engineering Tools using this approach. Those tools seem to be mostly academic; a commercial one is VISUALETHER PROTOCOL ANALYZER 7.0 13 , which uses the output of Wireshark (a network protocol analyzer) to generate sequence and callflow diagrams.…”
Section: Related Tools and Approachesmentioning
confidence: 99%
“…The work in [13] surveys Automatic Protocol Reverse Engineering Tools using this approach. Those tools seem to be mostly academic; a commercial one is VISUALETHER PROTOCOL ANALYZER 7.0 13 , which uses the output of Wireshark (a network protocol analyzer) to generate sequence and callflow diagrams. Avalle et al [14] survey state-of-the-art research aimed at automatically getting formal security proofs of models close to the source code of real protocol-logic implementations.…”
Section: Related Tools and Approachesmentioning
confidence: 99%
“…Automatic protocol reverse-engineering [4] techniques enable private protocols to be understood. The goal of automatic protocol reverse engineering is to extract the grammar, semantics, and state machine of private protocol messages [5][6][7].…”
Section: Background and Protocol Reversementioning
confidence: 99%
“…for item in SP do (4) for (Com , Com ) in Com do (5) if not equation (12) then (6) flag = 1 (7) break (8) end if (9) end for (10) if flag == 1 then (11) break (12) end if (13) join item in 2 (14) end for (15) The th bits in the check fields of commands Com and Com are assumed to be ( ) and ( ) , respectively, because they satisfy (9); ( ) and ( ) also satisfy…”
Section: Inferring the Location Of The Check Field And Generatormentioning
confidence: 99%