Title :
A Survey on Methods of Automatic Protocol Reverse Engineering
Author :
Li, Xiangdong ; Chen, Li
Author_Institution :
Sch. of Comput. Sci., Zhongyuan Univ. of Technol., Zhengzhou, China
Abstract :
Protocol reverse engineering is necessary for many security applications, and has been an important and active research topic. This paper makes a survey on automatic protocol reverse engineering, especially on the goals, methods, tools and their achievements. The targets and obstacles in automatic protocol reverse engineering are identified. Then the evolution of the technique and tools proposed for protocol reverse engineering are reviewed chronologically. Finally we summarize those difficulties and problems that are still open to solve, and envision the prospects of this field.
Keywords :
computer network security; protocols; research and development; reverse engineering; automatic protocol reverse engineering; research topic; security applications; Cryptography; Knowledge engineering; Protocols; Reverse engineering; Servers; Syntactics; binary analysis; network-based; program-based; protocol; reverse engineer; survey; tainted analysis;
Conference_Titel :
Computational Intelligence and Security (CIS), 2011 Seventh International Conference on
Conference_Location :
Hainan
Print_ISBN :
978-1-4577-2008-6
DOI :
10.1109/CIS.2011.156