Towards automated protocol reverse engineering using semantic information

Author(s):  
Georges Bossert ◽  
Frédéric Guihéry ◽  
Guillaume Hiet
1998 ◽  
Vol 21 (4) ◽  
pp. 468-468
Author(s):  
Philip J. Benson

Failure to take note of distinctive attributes in the distal stimulus leads to an inadequate proximal encoding. Representation of similarities in Chorus suffers in this regard. Distinctive qualities may require additional complex representation (e.g., reference to linguistic terms) in order to facilitate discrimination. Additional semantic information, which configures proximal attributes, permits accurate identification of true veridical stimuli.


2017 ◽  
Vol 2017 ◽  
pp. 1-9 ◽  
Author(s):  
Ran Ji ◽  
Jian Wang ◽  
Chaojing Tang ◽  
Ruilin Li

The increasing use of civil unmanned aerial vehicles (UAVs) has the potential to threaten public safety and privacy. Therefore, airspace administrators urgently need an effective method to regulate UAVs. Understanding the meaning and format of UAV flight control commands by automatic protocol reverse-engineering techniques is highly beneficial to UAV regulation. To improve our understanding of the meaning and format of UAV flight control commands, this paper proposes a method to automatically analyze the private flight control protocols of UAVs. First, we classify flight control commands collected from a binary network trace into clusters; then, we analyze the meaning of flight control commands by the accumulated error of each cluster; next, we extract the binary format of commands and infer field semantics in these commands; and finally, we infer the location of the check field in command and the generator polynomial matrix. The proposed approach is validated via experiments on a widely used consumer UAV.


2014 ◽  
Vol 513-517 ◽  
pp. 2496-2501
Author(s):  
Li Hua Zhao ◽  
Xue Jia Liang ◽  
Xiang Peng ◽  
Hua Feng Kong ◽  
Mei Zhen Wang

To infer the network protocol state machine is very useful in network security-related contexts, both in research and management. This process follows an extension of the classic Angluins L* algorithm and has achieved an extended version of some Mealy automata to represent or model a communication protocol. The algorithm has been validated by inferring the protocol state machine from SMTPFTP protocol, and tested offline algorithms for the comparison experiments. The experimental results show that this method can more accurately identify the network protocol state machine and is of the important application value.


Sign in / Sign up

Export Citation Format

Share Document