共 53 条
- [1] Li MJ., Reverse extracting of protocol model based on dynamic binary analysis and its application, (2014)
- [2] Narayan J, Shukla SK, Clancy TC., A survey of automatic protocol reverse engineering tools, ACM Computing Surveys, 48, 3, pp. 1-26, (2016)
- [3] Lee D., Yannakakis M., Principles and methods of testing finite state machines-a survey, Proceedings of the IEEE, 84, 8, pp. 1090-1123, (1996)
- [4] Tridgell A., How SAMBA was written, (2003)
- [5] About Wine, (2014)
- [6] Wang YP, Li XJ, Meng J, Zhao Y, Zhang ZB, Guo L., Biprominer: Automatic mining of binary protocol features, Proc. of the 12th Int'l Conf. on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2011, pp. 179-184, (2011)
- [7] NetZob, (2020)
- [8] Luo JZ, Yu SZ., Position-based automatic reverse engineering of network protocols, Journal of Network and Computer Applications, 36, 3, pp. 1070-1077, (2013)
- [9] Antunes J, Neves N, Verissimo P., Reverse engineering of protocols from network traces, Proc. of the the 18th Working Conf. on Reverse Engineering, pp. 169-178, (2011)
- [10] Wang Y, Zhang N, Wu YM, Su BB, Liao YJ., Protocol formats reverse engineering based on association rules in wireless environment, Proc. of the 12th IEEE Int'l Conf. on Trust, Security and Privacy in Computing and Communications, pp. 134-141, (2013)