메뉴 건너뛰기




Volumn , Issue , 2006, Pages 289-300

Binpac: A yacc for writing application protocol parsers

Author keywords

Parser generator; Protocol

Indexed keywords

COMPUTATIONAL COMPLEXITY; HIGH LEVEL LANGUAGES; NETWORK PROTOCOLS; SEMANTICS; SPECIFICATIONS; TELECOMMUNICATION TRAFFIC;

EID: 34547396634     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1177080.1177119     Document Type: Conference Paper
Times cited : (109)

References (46)
  • 6
    • 34547437889 scopus 로고
    • Generating a service specification of a connection management protocol
    • T. P. Blumer and J. C. Burruss. Generating a service specification of a connection management protocol. In PSTV, pages 161-170, 1982.
    • (1982) PSTV , pp. 161-170
    • Blumer, T.P.1    Burruss, J.C.2
  • 7
    • 34547412188 scopus 로고    scopus 로고
    • N. Borisov, D. J. Brumley, H. J. Wang, J. Dunagan, P. Joshi, and C. Guo. Generic application-level protocol analyzer and its language. Under submission
    • N. Borisov, D. J. Brumley, H. J. Wang, J. Dunagan, P. Joshi, and C. Guo. Generic application-level protocol analyzer and its language. Under submission.
  • 8
    • 34547412189 scopus 로고    scopus 로고
    • Common Internet File System
    • Common Internet File System. http://www.snia.org/ tech_activities/CIFS/ CIFS-TR-1p00_FINAL.pdf.
  • 10
    • 34547468589 scopus 로고    scopus 로고
    • DCE 1.1: Remote procedure call. http://www.opengroup.org/onlinepubs/ 9629399/toc.htm.
    • DCE 1.1: Remote procedure call. http://www.opengroup.org/onlinepubs/ 9629399/toc.htm.
  • 11
    • 34547446279 scopus 로고    scopus 로고
    • DSniff. www.monkey.org/dugsong/dsniff.
    • DSniff
  • 17
    • 85084160972 scopus 로고    scopus 로고
    • Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics
    • M. Handley, C. Kreibich, and V. Paxson. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. In Proceedings of USENIX Security Symposium, 2001.
    • (2001) Proceedings of USENIX Security Symposium
    • Handley, M.1    Kreibich, C.2    Paxson, V.3
  • 18
    • 18944390941 scopus 로고    scopus 로고
    • The model checker SPIN
    • G. J. Holzmann. The model checker SPIN. IEEE Trans. Softw. Eng., 23(5):279-295, 1997.
    • (1997) IEEE Trans. Softw. Eng , vol.23 , Issue.5 , pp. 279-295
    • Holzmann, G.J.1
  • 20
    • 0003792407 scopus 로고
    • Another Compiler-Compiler
    • No. 32, Bell Laboratories, Murray Hill, New Jersey, July
    • S. C. Johnson. YACC - Yet Another Compiler-Compiler. Computer Science Technical Report No. 32, Bell Laboratories, Murray Hill, New Jersey, July 1975.
    • (1975) Computer Science Technical Report
    • Johnson, S.C.1    Yet, Y.A.C.C.2
  • 21
    • 14944385133 scopus 로고    scopus 로고
    • An Empirical Study of Spam Traffic and the Use of DNS Black Lists
    • Taormina, Italy, October
    • J. Jung and E. Sit. An Empirical Study of Spam Traffic and the Use of DNS Black Lists. In Proceedings of the Internet Measurement Conference (IMC), Taormina, Italy, October 2004.
    • (2004) Proceedings of the Internet Measurement Conference (IMC)
    • Jung, J.1    Sit, E.2
  • 26
    • 0033659255 scopus 로고    scopus 로고
    • Packet Types: Abstract specifications of network protocol messages
    • P. J. McCann and S. Chandra. Packet Types: Abstract specifications of network protocol messages. In Proceedings of the ACM SIGCOMM Conference, pages 321-333, 2000.
    • (2000) Proceedings of the ACM SIGCOMM Conference , pp. 321-333
    • McCann, P.J.1    Chandra, S.2
  • 27
    • 34547469145 scopus 로고    scopus 로고
    • P. Mockapetris. DOMAIN NAMES - IMPLEMENTATION AND SPECIFICATION, Section 4.1.4, November 1987. RFC 1035.
    • P. Mockapetris. DOMAIN NAMES - IMPLEMENTATION AND SPECIFICATION, Section 4.1.4, November 1987. RFC 1035.
  • 31
    • 85084164413 scopus 로고    scopus 로고
    • BRO: A system for detecting network intruders in real time
    • San Antonio, TX, January
    • V. Paxson. BRO: A system for detecting network intruders in real time. In Proceedings of USENIX Security Symposium, San Antonio, TX, January 1998.
    • (1998) Proceedings of USENIX Security Symposium
    • Paxson, V.1
  • 33
    • 34547451829 scopus 로고    scopus 로고
    • NetWare Core Protocol. http://forge.novell.com/modules/xfmod/ project/?ncp.
    • NetWare Core Protocol
  • 34
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection. Technical report, Secure Networks, Inc
    • January
    • T. H. Ptacek and T. N. Newsham. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection. Technical report, Secure Networks, Inc., January 1998.
    • (1998)
    • Ptacek, T.H.1    Newsham, T.N.2
  • 35
    • 85090433665 scopus 로고    scopus 로고
    • SNORT: Lightweight intrusion detection for networks
    • M. Roesch. SNORT: Lightweight intrusion detection for networks. In Proceedings of USENIX LISA, 1999.
    • (1999) Proceedings of USENIX LISA
    • Roesch, M.1
  • 45
    • 34547448363 scopus 로고    scopus 로고
    • Separation of concerns. http://en.wikipedia.org/wiki/ Separation_of_concerns.
    • Separation of concerns


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.