共 8 条
- [1] Caballero J., Poosankam P., Kreibich C., Dispatcher: Enabling active botnet infiltration using automatic protocol reverse engineering, Proceedings of the ACM Conference on Computer and Communications Security, pp. 621-634, (2009)
- [2] Comparetti P.M., Wondracek G., Kruegel C., Prospex Protocol specification extraction, Proceedings of 2009 30th IEEE Symposium on Security and Privacy (SP), pp. 110-125, (2009)
- [3] Brumley D., Caballero J., Liang Z., Towards automatic discovery of deviations in binaryimplementations with applications to error detection and fingerprint generation, 16th USENIX Security Symposium, pp. 213-228, (2007)
- [4] Pan F., Wu L., Du Y., Et al., Overviews on protocol reverse engineering, Application Research of Computers, 28, 8, pp. 2801-2806, (2011)
- [5] Beddoe M., Protocd information project
- [6] Cui W., Paxson V., Weaver N.C., Discoverer: Automatic protocol reverse engineering from network traces, 16th USENIX Security Symposium, (2008)
- [7] Antunes J., Neves N., Verissimo P., Reverse engineering of protocols from network traces, 18th Working Conference on Reverse Engineering, pp. 169-178, (2011)
- [8] Ying L., Yang Y., Feng D., Et al., Syntax and behavior semantics analysis of network protocol of malware, Journal of Software, 22, 7, pp. 1676-1689, (2011)