- Home
- Publications
- Publication Search
- Publication Details
Title
Protocol Reverse-Engineering Methods and Tools: A Survey
Authors
Keywords
Protocol reverse engineering, Communication security, Network analysis, Binary analysis
Journal
COMPUTER COMMUNICATIONS
Volume 182, Issue -, Pages 238-254
Publisher
Elsevier BV
Online
2021-11-27
DOI
10.1016/j.comcom.2021.11.009
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Clustering method in protocol reverse engineering for industrial protocols
- (2020) Kyu‐Seok Shim et al. International Journal of Network Management
- Clustering of unknown protocol messages based on format comparison
- (2020) Fanghui Sun et al. Computer Networks
- A Type-Aware Approach to Message Clustering for Protocol Reverse Engineering
- (2019) Xin Luo et al. SENSORS
- Unsupervised field segmentation of unknown protocol messages
- (2019) Fanghui Sun et al. COMPUTER COMMUNICATIONS
- A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View
- (2018) Baraka D. Sija et al. Security and Communication Networks
- Automatic protocol reverse engineering using grammatical inference
- (2017) Ming-Ming Xiao et al. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS
- A nonparametric approach to the automated protocol fingerprint inference
- (2017) YiPeng Wang et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Bit-oriented format extraction approach for automatic binary protocol reverse engineering
- (2016) Siyu Tao et al. IET Communications
- Automatic network protocol message format analysis
- (2016) Ming-Ming Xiao et al. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS
- Analyzing Network Protocols of Application Layer Using Hidden Semi-Markov Model
- (2016) Jun Cai et al. MATHEMATICAL PROBLEMS IN ENGINEERING
- Capturing Uncertainty Information and Categorical Characteristics for Network Payload Grouping in Protocol Reverse Engineering
- (2015) Jian-Zhen Luo et al. MATHEMATICAL PROBLEMS IN ENGINEERING
- Position-based automatic reverse engineering of network protocols
- (2013) Jian-Zhen Luo et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Automatic protocol reverse-engineering: Message format extraction and field semantics inference
- (2012) Juan Caballero et al. Computer Networks
- Hidden semi-Markov models
- (2009) Shun-Zheng Yu ARTIFICIAL INTELLIGENCE
- Reverse Engineering Input Syntactic Structure from Program Execution and Its Applications
- (2009) Zhiqiang Lin et al. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExplorePublish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn More