Survey on Network Protocol Reverse Engineering Approaches, Methods and Tools

被引:0
|
作者
Sija, Baraka D. [1 ]
Goo, Young-Hoon [1 ]
Kyu-Seok-Shim [1 ]
Kim, Sungyun [2 ]
Choi, Mi-Jung [2 ]
Kim, Myung-Sup [1 ]
机构
[1] Korea Univ, Dept Comp & Informat Sci, Sejong, South Korea
[2] Kangwon Natl Univ, Dept Comp Sci, Chunchon, South Korea
关键词
Network Protocols; Unknown Network Protocols; Protocol Reverse Engineering; PRE Outputs; Survey;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A network protocol defines rules that control communications between two or more hosts on the Internet, whereas Protocol Reverse Engineering (PRE) defines the process of extracting the structure, attributes and data from a network protocol. Enough knowledge on protocol specifications is essential for security purposes, network policy implementation and management of network resources. Protocol Reverse Engineering is a complex process intended to uncover specifications of unknown protocols. The complexity of PRE, in terms of time consumption, tediousness and error-prone, has led to short and diverse outcomes of Protocols Reverse Engineering approaches. This paper, surveys outputs of 9 PRE approaches in three divisions with methodology analysis and its possible applications. Moreover, in the introductory part we provide a general PRE literature in great depth.
引用
收藏
页码:271 / 274
页数:4
相关论文
共 50 条
  • [31] Review of reverse engineering approaches
    Motavalli, S
    [J]. COMPUTERS & INDUSTRIAL ENGINEERING, 1998, 35 (1-2) : 25 - 28
  • [32] Survey on Applications of Formal Methods in Reverse Engineering and Intellectual Property Protection
    Shahrzad Keshavarz
    Cunxi Yu
    Samaneh Ghandali
    Xiaolin Xu
    Daniel Holcomb
    [J]. Journal of Hardware and Systems Security, 2018, 2 (3) : 214 - 224
  • [33] Analysis of Ten Reverse Engineering Tools
    Koskinen, Jussi
    Lehmonen, Tero
    [J]. ADVANCES TECHNIQUES IN COMPUTING SCIENCES AND SOFTWARE ENGINEERING, 2010, : 389 - +
  • [34] A comparison of four reverse engineering tools
    Bellay, B
    Gall, H
    [J]. PROCEEDINGS OF THE FOURTH WORKING CONFERENCE ON REVERSE ENGINEERING, 1997, : 2 - 11
  • [35] Hardware Reverse Engineering Tools and Techniques
    Gordon, Thomas
    Kilgore, Eric
    Wylds, Nick
    Nowatkowski, Michael
    [J]. 2019 IEEE SOUTHEASTCON, 2019,
  • [36] A system for generating reverse engineering tools
    Canfora, G
    DeLucia, A
    DiLucca, GA
    [J]. EIGHTH IEEE INTERNATIONAL WORKSHOP ON SOFTWARE TECHNOLOGY AND ENGINEERING PRACTICE INCORPORATING COMPUTER AIDED SOFTWARE ENGINEERING, PROCEEDINGS, 1997, : 34 - 44
  • [37] A Network Protocol Reverse Engineering Method Based on Dynamic Taint Propagation Similarity
    Li, Weiming
    Ai, Meirong
    Jin, Bo
    [J]. INTELLIGENT COMPUTING THEORIES AND APPLICATION, ICIC 2016, PT I, 2016, 9771 : 580 - 592
  • [38] Protocol vulnerability detection based on network traffic analysis and binary reverse engineering
    Wen, Shameng
    Meng, Qingkun
    Feng, Chao
    Tang, Chaojing
    [J]. PLOS ONE, 2017, 12 (10):
  • [39] KNOWLEDGE BASED ENGINEERING AND ONTOLOGY ENGINEERING APPROACHES FOR PRODUCT DEVELOPMENT: METHODS AND TOOLS FOR DESIGN AUTOMATION IN INDUSTRIAL ENGINEERING
    Furini, Francesco
    Rossoni, Marco
    Colombo, Giorgio
    [J]. PROCEEDINGS OF THE ASME INTERNATIONAL MECHANICAL ENGINEERING CONGRESS AND EXPOSITION, 2016, VOL. 11, 2017,
  • [40] A Yeast Synthetic Network for In Vivo Assessment of Reverse-Engineering and Modeling Approaches
    Cantone, Irene
    Marucci, Lucia
    Iorio, Francesco
    Ricci, Maria Aurelia
    Belcastro, Vincenzo
    Bansal, Mukesh
    Santini, Stefania
    di Bernardo, Mario
    di Bernardo, Diego
    Cosma, Maria Pia
    [J]. CELL, 2009, 137 (01) : 172 - 181