메뉴 건너뛰기




Volumn , Issue , 2008, Pages 391-402

Tupni: Automatic reverse engineering of input formats

Author keywords

Binary analysis; Protocol re erse engineering

Indexed keywords

BINARY ANALYSIS; FILE FORMATS; FILE-FORMAT SPECIFICATION; INPUT CONSTRAINTS; INPUT FORMAT; MULTIPLE INPUTS; PROTOCOL RE ERSE ENGINEERING; REVERSE ENGINEERING TOOLS; REVERSE ENGINEERS; SECURITY APPLICATION; TEST INPUTS; VULNERABILITY SIGNATURE;

EID: 70349283250     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1455770.1455820     Document Type: Conference Paper
Times cited : (200)

References (42)
  • 1
    • 70349299454 scopus 로고    scopus 로고
    • International Telecommunication Union Recommendation T.81: JPEG Specification. http://www.w3.org/Graphics/JPEG/itu-t81.pdf.
    • International Telecommunication Union Recommendation T.81: JPEG Specification. http://www.w3.org/Graphics/JPEG/itu-t81.pdf.
  • 2
    • 70349277996 scopus 로고    scopus 로고
    • TIFF Revision 6.0. http://partners.adobe.com/public/developer/en/tiff/ TIFF6.pdf.
    • TIFF Revision 6.0. http://partners.adobe.com/public/developer/en/tiff/ TIFF6.pdf.
  • 3
    • 33846012075 scopus 로고    scopus 로고
    • A. Aho, M. Lam, R. Sethi, and J. Ullman. Compilers:, Addison-Wesley
    • A. Aho, M. Lam, R. Sethi, and J. Ullman. Compilers: Principles, Techniques, and Tools. Addison-Wesley, 2007.
    • (2007) Principles, Techniques, and Tools
  • 7
    • 0347747977 scopus 로고    scopus 로고
    • Greedy local improvement and weighted setpacking
    • B. Chandra and M. Halldórsson. Greedy local improvement and weighted setpacking. Journal of Algorithms, 39(2):223-240, 2001.
    • (2001) Journal of Algorithms , vol.39 , Issue.2 , pp. 223-240
    • Chandra, B.1    Halldórsson, M.2
  • 8
    • 84866655092 scopus 로고    scopus 로고
    • 6th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE 2005)
    • 88-95
    • M. Christodorescu, N. Kidd, and W.-H. Goh. String analysis for x86 binaries. 6th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE 2005). 31(1):88-95, 2006.
    • (2006) , vol.31 , Issue.1
    • Christodorescu, M.1    Kidd, N.2    Goh, W.-H.3
  • 20
    • 70349267143 scopus 로고    scopus 로고
    • T. O. Group. Dcc 1.1: Remote procedure call. http://www.opengroup.org/ onlinepubs/9629399/toc.htm.
    • T. O. Group. Dcc 1.1: Remote procedure call. http://www.opengroup.org/ onlinepubs/9629399/toc.htm.
  • 21
    • 33646508996 scopus 로고    scopus 로고
    • On the complexity of approximating k-set packing
    • E. Hazan, S. Safra, and O. Schwartz. On the complexity of approximating k-set packing. Computational Complexity, 15(1):20-39, 2006.
    • (2006) Computational Complexity , vol.15 , Issue.1 , pp. 20-39
    • Hazan, E.1    Safra, S.2    Schwartz, O.3
  • 26
    • 70350414407 scopus 로고    scopus 로고
    • Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
    • Z. Lin, X. Jiang, D. Xu, and X. Zhang. Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. In Proceedings of NDSS'2008, 2008.
    • (2008) Proceedings of NDSS'2008
    • Lin, Z.1    Jiang, X.2    Xu, D.3    Zhang, X.4
  • 32
    • 34547396634 scopus 로고    scopus 로고
    • R. Pang, V. Paxson, R. Somer, and L. Peterson. binpac: A yacc for Writing Application Protocol Parsers. In Proceedings of the 2006 Internet Measurement Conference, October 2006.
    • R. Pang, V. Paxson, R. Somer, and L. Peterson. binpac: A yacc for Writing Application Protocol Parsers. In Proceedings of the 2006 Internet Measurement Conference, October 2006.
  • 33
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real time
    • V. Paxson. Bro: A system for detecting network intruders in real time. Computer Networks, 31 (23):2435-2463, 1999.
    • (1999) Computer Networks , vol.31 , Issue.23 , pp. 2435-2463
    • Paxson, V.1
  • 35
    • 70349293259 scopus 로고    scopus 로고
    • The Protocol Informatics Project
    • The Protocol Informatics Project. http://www.baselineresearch.net/PI/.
  • 36
  • 37
    • 70349290174 scopus 로고    scopus 로고
    • K. Sollins. Rfc 1350: The tftp protocol (revision 2). http://www.faqs.org/rfcs/rfc1350.html.
    • K. Sollins. Rfc 1350: The tftp protocol (revision 2). http://www.faqs.org/rfcs/rfc1350.html.
  • 41
    • 27544510809 scopus 로고    scopus 로고
    • Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits
    • August
    • H. J. Wang, C. Guo, D. R. Simon, and A. Zugenmaier. Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits. In Proceedings of the ACM SIGCOMM, August 2004.
    • (2004) Proceedings of the ACM SIGCOMM
    • Wang, H.J.1    Guo, C.2    Simon, D.R.3    Zugenmaier, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.