Sciweavers

Share
28 search results - page 1 / 6
» Tupni: automatic reverse engineering of input formats
Sort
View
CCS
2008
ACM
10 years 4 months ago
Tupni: automatic reverse engineering of input formats
Recent work has established the importance of automatic reverse engineering of protocol or file format specifications. However, the formats reverse engineered by previous tools ha...
Weidong Cui, Marcus Peinado, Karl Chen, Helen J. W...
ESORICS
2009
Springer
11 years 3 months ago
ReFormat: Automatic Reverse Engineering of Encrypted Messages
Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in...
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang,...
NDSS
2008
IEEE
10 years 9 months ago
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have rec...
Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zh...
ICSE
2008
IEEE-ACM
11 years 2 months ago
CCVisu: automatic visual software decomposition
Understanding the structure of large existing (and evolving) software systems is a major challenge for software engineers. In reverse engineering, we aim to compute, for a given s...
Dirk Beyer
NDSS
2008
IEEE
10 years 9 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level speciļ¬cations for network protocols. Such speciļ¬cations are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
books