Discoverer: Automatic Protocol Reverse Engineering from Network Traces


Application-level protocol specifications are useful for many security applications, including intrusion prevention and detection that performs deep packet inspection and traffic normalization, and penetration testing that generates network inputs to an application to uncover potential vulnerabilities. However, current practice in deriving protocol… (More)


10 Figures and Tables


Citations per Year

199 Citations

Semantic Scholar estimates that this publication has 199 citations based on the available data.

See our FAQ for additional information.

Cite this paper

@inproceedings{Cui2007DiscovererAP, title={Discoverer: Automatic Protocol Reverse Engineering from Network Traces}, author={Weidong Cui and Jayanthkumar Kannan and Helen J. Wang}, booktitle={USENIX Security Symposium}, year={2007} }