Discoverer: Automatic Protocol Reverse Engineering from Network Traces

Abstract

Application-level protocol specifications are useful for many security applications, including intrusion prevention and detection that performs deep packet inspection and traffic normalization, and penetration testing that generates network inputs to an application to uncover potential vulnerabilities. However, current practice in deriving protocol… (More)

Topics

10 Figures and Tables

Statistics

010203020082009201020112012201320142015201620172018
Citations per Year

199 Citations

Semantic Scholar estimates that this publication has 199 citations based on the available data.

See our FAQ for additional information.

Cite this paper

@inproceedings{Cui2007DiscovererAP, title={Discoverer: Automatic Protocol Reverse Engineering from Network Traces}, author={Weidong Cui and Jayanthkumar Kannan and Helen J. Wang}, booktitle={USENIX Security Symposium}, year={2007} }