2022
DOI: 10.1016/j.comcom.2021.11.009
|View full text |Cite
|
Sign up to set email alerts
|

Protocol Reverse-Engineering Methods and Tools: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(4 citation statements)
references
References 44 publications
0
3
0
Order By: Relevance
“…Protocol reverse engineering is a field that is still actively studied. New methods surface every year [20], some of them being reiterations of previous algorithms, some of them being completely new methods that are built on state-of-the-art applications such as machine learning. Some recent examples are an algorithm by Yang et al [29] that leverages deep learning, and another one by Wang et al [30] that employs convolutional neural networks.…”
Section: Related Workmentioning
confidence: 99%
“…Protocol reverse engineering is a field that is still actively studied. New methods surface every year [20], some of them being reiterations of previous algorithms, some of them being completely new methods that are built on state-of-the-art applications such as machine learning. Some recent examples are an algorithm by Yang et al [29] that leverages deep learning, and another one by Wang et al [30] that employs convolutional neural networks.…”
Section: Related Workmentioning
confidence: 99%
“…Heuristic. By analyzing the design specifcations of most public industrial control protocols, we propose two types of protocol characteristics: inter and intra-message characteristics [7,19,29].…”
Section: Bw Generation Algorithmmentioning
confidence: 99%
“…Conversely, industrial control protocols have also become the focus of defense against these attacks [4][5][6]. However, because of commercial and security factors, most industrial control protocol specifcations are not open to the public [7,8]. Tese private industrial control protocols pose a challenge for protocol analysis.…”
Section: Introductionmentioning
confidence: 99%
“…Besides, such resources became useful crisis facing assets during virtual teaching sessions that occurred during COVID pandemic for instance [5]. On the other hand, in the framework of reverse engineering [17,20], being capable of analyzing mechanical and material properties of a system without damaging it is a required skill for future mechanical engineers aiming at sustainable development.…”
mentioning
confidence: 99%