Sciweavers

34 search results - page 7 / 7
» Replayer: automatic protocol replay by binary analysis
Sort
View
GLOBECOM
2008
IEEE
13 years 11 months ago
Delay Analysis of Aloha Network
—This paper provides a queueing analysis for the slotted Aloha network. We assume the use of an exponential backoff protocol. Most prior work on slotted Aloha focuses on the anal...
Soung Chang Liew, Ying Jun Zhang, Da Rui Chen
CCS
2008
ACM
13 years 7 months ago
Tupni: automatic reverse engineering of input formats
Recent work has established the importance of automatic reverse engineering of protocol or file format specifications. However, the formats reverse engineered by previous tools ha...
Weidong Cui, Marcus Peinado, Karl Chen, Helen J. W...
NDSS
2007
IEEE
13 years 11 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...
CAV
2000
Springer
197views Hardware» more  CAV 2000»
13 years 9 months ago
Bounded Model Construction for Monadic Second-Order Logics
Address: Abstraction, Composition, Symmetry, and a Little Deduction: The Remedies to State Explosion . . . . . . . . . . . . . . . . . . . . . . . . . . 1 A. Pnueli Invited Address...
Abdelwaheb Ayari, David A. Basin