A Survey of Automatic Protocol Reverse Engineering Tools

@article{Narayan2015ASO,
  title={A Survey of Automatic Protocol Reverse Engineering Tools},
  author={John Narayan and Sandeep K. Shukla and T. Charles Clancy},
  journal={ACM Comput. Surv.},
  year={2015},
  volume={48},
  pages={40:1-40:26}
}
Computer network protocols define the rules in which two entities communicate over a network of unique hosts. Many protocol specifications are unknown, unavailable, or minimally documented, which prevents thorough analysis of the protocol for security purposes. For example, modern botnets often use undocumented and unique application-layer communication protocols to maintain command and control over numerous distributed hosts. Inferring the specification of closed protocols has numerous… CONTINUE READING
Highly Cited
This paper has 29 citations. REVIEW CITATIONS

11 Figures & Tables

Topics

Statistics

0204060201620172018
Citations per Year

Citation Velocity: 13

Averaging 13 citations per year over the last 3 years.

Learn more about how we calculate this metric in our FAQ.