2014 IEEE Security and Privacy Workshops 2014
DOI: 10.1109/spw.2014.34
|View full text |Cite
|
Sign up to set email alerts
|

Finite State Machine Parsing for Internet Protocols: Faster Than You Think

Abstract: Abstract-A parser's job is to take unstructured, opaque data and convert it to a structured, semantically meaningful format. As such, parsers often operate at the border between untrusted data sources (e.g., the Internet) and the soft, chewy center of computer systems, where performance and security are paramount. A firewall, for instance, is precisely a trust-creating parser for Internet protocols, permitting valid packets to pass through and dropping or actively rejecting malformed packets. Despite the preva… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…BASED ON NFA DFA and NFA can be leveraged as the modeling tool for many other applications: pattern matching [27], search on genome [10], [28], internet protocol parsing [29], deep packet inspection [30], [32], regular expressions search [31], [32], etc. Here, we focus on privacy-preserving NFA based errortolerant gene matching (P-Gene).…”
Section: Secure Error-tolerant Gene Matchingmentioning
confidence: 99%
“…BASED ON NFA DFA and NFA can be leveraged as the modeling tool for many other applications: pattern matching [27], search on genome [10], [28], internet protocol parsing [29], deep packet inspection [30], [32], regular expressions search [31], [32], etc. Here, we focus on privacy-preserving NFA based errortolerant gene matching (P-Gene).…”
Section: Secure Error-tolerant Gene Matchingmentioning
confidence: 99%
“…String matching algorithms form an important class of algorithms in computer science. They are critical in applications such as network intrusion detection systems [1,2,3,4], information retrieval [5], text editing applications [6], searching for records with state values in database systems [7,8], spell-checkers [9], DNA sequence mapping [10], virus scanning [11], IP (Internet Protocol) lookup [12], and protocol parsers [13]. Applications use either exact or approximate string matching.…”
Section: Introductionmentioning
confidence: 99%