Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Binary protocol

A binary protocol is a protocol which is intended or expected to be read by a machine rather than a human being, as opposed to a plain text protocol… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Protocol message format extraction is a principal process of automatic network protocol reverse engineering when target protocol… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2015
2015
The security of network services and their protocols critically depends on minimizing their attack surface. A single flaw in an… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2015
2015
Few can deny the diverse applications of NoSQL Database technology today. The last decade has witnessed an exponential rise in… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2014
2014
Communication protocol reverse engineering has played an important role in the field of network security. Inferring protocol… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2013
2013
Abstract Automatic protocol reverse engineering is a process of extracting protocol message formats and protocol state machine… Expand
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Extracting the protocol message format specifications of unknown applications from network traces is important for a variety of… Expand
  • figure 2
  • figure 3
  • figure 4
  • table I
  • figure 5
Is this relevant?
2012
2012
Within the last years, new techniques for network covert channels arose, such as covert channel overlay networking, protocol… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2012
Highly Cited
2012
In recent years we have witnessed several complex and high-impact attacks specifically targeting "binary" protocols (RPC, Samba… Expand
  • table 1
  • table 2
  • table 3
Is this relevant?
2011
2011
Application-level protocol specifications are helpful for network security management, including intrusion detection and… Expand
  • figure 1
  • figure 2
  • table I
  • table II
  • figure 3
Is this relevant?
2009
2009
Network Protocol Reverse Engineering (NPRE) has played an increasing role in honeypot operations. It allows to automatically… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 6
Is this relevant?