ReFormat: Automatic Reverse Engineering of Encrypted Messages

@inproceedings{Wang2009ReFormatAR,
  title={ReFormat: Automatic Reverse Engineering of Encrypted Messages},
  author={Zhi Wang and Xuxian Jiang and Weidong Cui and Xinyuan Wang and Mike Grace},
  booktitle={ESORICS},
  year={2009}
}
Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in analyzing only plain-text communications wherein the exchanged messages are not encrypted. In this paper, we propose ReFormat, a system that aims at deriving the message format even when the message is encrypted. Our approach is based on the observation that an encrypted input message will typically go through two… CONTINUE READING
Highly Influential
This paper has highly influenced 19 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 135 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 76 extracted citations

Cyber Threat Intelligence

Advances in Information Security • 2018
View 6 Excerpts
Highly Influenced

State of the art of network protocol reverse engineering tools

Journal of Computer Virology and Hacking Techniques • 2016
View 4 Excerpts
Highly Influenced

A Survey of Automatic Protocol Reverse Engineering Tools

View 7 Excerpts
Method Support
Highly Influenced

A Survey on Methods of Automatic Protocol Reverse Engineering

2011 Seventh International Conference on Computational Intelligence and Security • 2011
View 8 Excerpts
Method Support
Highly Influenced

135 Citations

01020'10'12'14'16'18
Citations per Year
Semantic Scholar estimates that this publication has 135 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 15 references

Tupni: automatic reverse engineering of input formats

ACM Conference on Computer and Communications Security • 2008
View 6 Excerpts
Highly Influenced

Prospex: Protocol Specification Extraction

2009 30th IEEE Symposium on Security and Privacy • 2009
View 3 Excerpts

Reformat: Automatic Reverse Engineering of Encrypted Messages

Z. Wang, X. Jiang, W. Cui, X. Wang
(Department of Computer Science Technical Report, North Carolina State University, TR-2008-26) • 2008
View 1 Excerpt