A Network Protocol Reverse Engineering Method Based on Dynamic Taint Propagation Similarity

Author(s):  
Weiming Li ◽  
Meirong Ai ◽  
Bo Jin
2014 ◽  
Vol 513-517 ◽  
pp. 2496-2501
Author(s):  
Li Hua Zhao ◽  
Xue Jia Liang ◽  
Xiang Peng ◽  
Hua Feng Kong ◽  
Mei Zhen Wang

To infer the network protocol state machine is very useful in network security-related contexts, both in research and management. This process follows an extension of the classic Angluins L* algorithm and has achieved an extended version of some Mealy automata to represent or model a communication protocol. The algorithm has been validated by inferring the protocol state machine from SMTPFTP protocol, and tested offline algorithms for the comparison experiments. The experimental results show that this method can more accurately identify the network protocol state machine and is of the important application value.


2017 ◽  
Vol 14 (1) ◽  
pp. 53-68 ◽  
Author(s):  
Julien Duchêne ◽  
Colas Le Guernic ◽  
Eric Alata ◽  
Vincent Nicomette ◽  
Mohamed Kaâniche

2018 ◽  
Vol 2018 ◽  
pp. 1-17 ◽  
Author(s):  
Baraka D. Sija ◽  
Young-Hoon Goo ◽  
Kyu-Seok Shim ◽  
Huru Hasanova ◽  
Myung-Sup Kim

A network protocol defines rules that control communications between two or more machines on the Internet, whereas Automatic Protocol Reverse Engineering (APRE) defines the way of extracting the structure of a network protocol without accessing its specifications. Enough knowledge on undocumented protocols is essential for security purposes, network policy implementation, and management of network resources. This paper reviews and analyzes a total of 39 approaches, methods, and tools towards Protocol Reverse Engineering (PRE) and classifies them into four divisions, approaches that reverse engineer protocol finite state machines, protocol formats, and both protocol finite state machines and protocol formats to approaches that focus directly on neither reverse engineering protocol formats nor protocol finite state machines. The efficiency of all approaches’ outputs based on their selected inputs is analyzed in general along with appropriate reverse engineering inputs format. Additionally, we present discussion and extended classification in terms of automated to manual approaches, known and novel categories of reverse engineered protocols, and a literature of reverse engineered protocols in relation to the seven layers’ OSI (Open Systems Interconnection) model.


Author(s):  
Baraka D. Sija ◽  
Young-Hoon Goo ◽  
Kyu-Seok-Shim ◽  
Sungyun Kim ◽  
Mi-Jung Choi ◽  
...  

2021 ◽  
Vol 1098 (6) ◽  
pp. 062108
Author(s):  
A P Budijono ◽  
S S Syah ◽  
W D Kurniawan ◽  
B N Habib

2013 ◽  
Vol 655-657 ◽  
pp. 1237-1241
Author(s):  
Chuan Qi Wang ◽  
Jian Zhang ◽  
Wei Rong Wang ◽  
Xue Jing Gu

Currently, the ancient calligraphy and painting are widely used in decoration screen; however, the processing technic is normally based on manual manipulation. Normally, this kind of processing is not efficient, and with highly cost. In addition, it could not maintain the original artistic style in maximum. the paper proposes to process the sculpture of ancient calligraphy according to its photo, by adopting the CNC technology based on reverse engineering method, which enables to mostly keep the original artistic style, and to create the CNC code automatically with the assistant of image processing to achieve intelligent machining.


Sign in / Sign up

Export Citation Format

Share Document