메뉴 건너뛰기




Volumn , Issue , 2009, Pages 110-125

Prospex: Protocol specification extraction

Author keywords

[No Author keywords available]

Indexed keywords

BEHAVIOR-BASED; BLACK BOXES; COMMAND AND CONTROL; DEEP PACKET INSPECTION; HUMAN INTERACTIONS; MESSAGE FORMAT; NETWORK TRAFFIC; PROTOCOL MESSAGE; PROTOCOL SPECIFICATIONS; REAL-WORLD; REAL-WORLD APPLICATION; REVERSE ENGINEERS; SECURITY VULNERABILITIES; SERVER BEHAVIOR; STATE MACHINE;

EID: 70350402293     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2009.14     Document Type: Conference Paper
Times cited : (255)

References (66)
  • 1
    • 17444400103 scopus 로고    scopus 로고
    • Violating assumptions with fuzzing
    • P. Oehlert, "Violating Assumptions with Fuzzing," IEEE Security and Privacy, vol.3, no.2, 2005.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.2
    • Oehlert, P.1
  • 3
    • 85084164413 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," in Usenix Security Symposium, 1998.
    • (1998) Usenix Security Symposium
    • Paxson, V.1
  • 7
    • 85077688456 scopus 로고    scopus 로고
    • Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
    • D. Brumley, J. Caballero, Z. Liang, J. Newsome, and D. Song, "Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation," in Usenix Security Symposium, 2007.
    • (2007) Usenix Security Symposium
    • Brumley, D.1    Caballero, J.2    Liang, Z.3    Newsome, J.4    Song, D.5
  • 11
    • 84893143817 scopus 로고    scopus 로고
    • Discoverer: Automatic protocol reverse engineering from network traces
    • W. Cui, J. Kannan, and H. Wang, "Discoverer: Automatic Protocol Reverse Engineering from Network Traces," in 16th Usenix Security Symposium, 2007.
    • (2007) 16th Usenix Security Symposium
    • Cui, W.1    Kannan, J.2    Wang, H.3
  • 21
    • 0142068387 scopus 로고    scopus 로고
    • Faster algorithms for finding minimal consistent DFAs
    • K. J. Lang, "Faster Algorithms for Finding Minimal Consistent DFAs," NEC Research Institute, Tech. Rep., 1999.
    • (1999) NEC Research Institute, Tech. Rep.
    • Lang, K.J.1
  • 26
    • 0014757386 scopus 로고
    • A general method applicable to the search for similarities in the amino acid sequence of two proteins
    • S. Needleman and C.Wunsch, "A General Method Applicable to the Search for Similarities in the Amino Acid Sequence of Two Proteins," Journal of Molecular Biology, vol.48, no.3, 1970.
    • (1970) Journal of Molecular Biology , vol.48 , Issue.3
    • Needleman, S.1    Wunsch, C.2
  • 27
    • 84980090975 scopus 로고
    • The distribution of Flora in the alpine zone
    • P. Jaccard, "The Distribution of Flora in the Alpine Zone," The New Phytologist, vol.11, no.2, pp. 37-50, 1912.
    • (1912) The New Phytologist , vol.11 , Issue.2 , pp. 37-50
    • Jaccard, P.1
  • 28
    • 84941155240 scopus 로고
    • Well separated clusters and optimal fuzzy partitions
    • J. Dunn, "Well Separated Clusters and Optimal Fuzzy Partitions," Journal of Cybernetics, vol.4, 1974.
    • (1974) Journal of Cybernetics , vol.4
    • Dunn, J.1
  • 29
    • 0031166291 scopus 로고    scopus 로고
    • Cluster validation using graph theoretic concepts
    • N. R. Pal and J. Biswas, "Cluster Validation Using Graph Theoretic Concepts," Pattern Recognition, vol.30, no.6, 1997.
    • (1997) Pattern Recognition , vol.30 , Issue.6
    • Pal, N.R.1    Biswas, J.2
  • 30
    • 49949150022 scopus 로고
    • Language identification in the limit
    • E. M. Gold, "Language Identification in the Limit," Information and Control, vol.10, no.5, 1967.
    • (1967) Information and Control , vol.10 , Issue.5
    • Gold, E.M.1
  • 31
    • 19944414336 scopus 로고    scopus 로고
    • Inference of regular languages using state merging algorithms with search
    • M. Bugalho and A. L. Oliveira, "Inference of Regular Languages Using State Merging Algorithms with Search," Pattern Recognition, vol.38, no.9, 2005.
    • (2005) Pattern Recognition , vol.38 , Issue.9
    • Bugalho, M.1    Oliveira, A.L.2
  • 32
    • 0001187706 scopus 로고
    • Complexity of automaton identification from given data
    • E. M. Gold, "Complexity of Automaton Identification from Given Data," Information and Control, vol.37, no.3, 1978.
    • (1978) Information and Control , vol.37 , Issue.3
    • Gold, E.M.1
  • 33
    • 0025557712 scopus 로고
    • An empirical study of the reliability of UNIX utilities
    • B. Miller, L. Fredriksen, and B. So, "An Empirical Study of the Reliability of UNIX Utilities," Communications of the ACM, vol.33, no.12, 1990.
    • (1990) Communications of the ACM , vol.33 , Issue.12
    • Miller, B.1    Fredriksen, L.2    So, B.3
  • 36
    • 20844452458 scopus 로고    scopus 로고
    • A short visit to the bot zoo [Malicious Bots Software]
    • T. Holz, "A Short Visit to the Bot Zoo [Malicious Bots Software]," Security & Privacy, IEEE, vol.3, no.3, 2005.
    • (2005) Security & Privacy, IEEE , vol.3 , Issue.3
    • Holz, T.1
  • 39
    • 84869665647 scopus 로고    scopus 로고
    • "X-Lite softphone," http://www.counterpath.com, 2008.
    • (2008) X-lite Softphone
  • 42
    • 84869672530 scopus 로고    scopus 로고
    • Wietse Venema, "Postfix," http://www.postfix.org, 2008.
    • (2008) Postfix
    • Venema, W.1
  • 43
    • 0142131676 scopus 로고
    • A general objective for inductive inference
    • Department of Computer Science
    • C. Wallace and M. Georgeff, "A General Objective for Inductive Inference," Department of Computer Science, Monash University, Tech. Rep., 1983.
    • (1983) Monash University, Tech. Rep.
    • Wallace, C.1    Georgeff, M.2
  • 47
    • 84869679989 scopus 로고    scopus 로고
    • "PFSA Toolkit," http://www.cs.usyd.edu.au/-rcdmnl/PFSA.
    • PFSA Toolkit
  • 48
    • 34948849748 scopus 로고    scopus 로고
    • QUARK: Empirical assessment of automaton-based specification miners
    • IEEE Computer Society
    • D. Lo and S. Khoo, "QUARK: Empirical Assessment of Automaton-based Specification Miners," in 13th Working Conference on Reverse Engineering (WCRE). IEEE Computer Society, 2006.
    • (2006) 13th Working Conference on Reverse Engineering (WCRE)
    • Lo, D.1    Khoo, S.2
  • 53
    • 84869673613 scopus 로고    scopus 로고
    • "How Samba Was Written," http://samba.org/ftp/tridge/misc/ french-cafe.txt, 2007.
    • (2007) How Samba was Written
  • 54
    • 70449682265 scopus 로고    scopus 로고
    • The protocol informatics project
    • M. Beddoe, "The Protocol Informatics Project," in Toorcon, 2004.
    • (2004) Toorcon
    • Beddoe, M.1
  • 55
    • 0036983315 scopus 로고    scopus 로고
    • Automatic extraction of object-oriented component interfaces
    • J. Whaley, M. C. Martin, and M. S. Lam, "Automatic Extraction of Object-Oriented Component Interfaces," SIGSOFT Softw. Eng. Notes, vol.27, no.4, 2002.
    • (2002) SIGSOFT Softw. Eng. Notes , vol.27 , Issue.4
    • Whaley, J.1    Martin, M.C.2    Lam, M.S.3
  • 58
    • 17044362578 scopus 로고    scopus 로고
    • Synthesis of interface specifications for Java classes
    • R. Alur, P. Černý, P. Madhusudan, and W. Nam, "Synthesis of Interface Specifications for Java Classes," SIGPLAN Not., vol.40, no.1, 2005.
    • (2005) SIGPLAN Not. , vol.40 , Issue.1
    • Alur, R.1    Černý, P.2    Madhusudan, P.3    Nam, W.4
  • 59
    • 0023453626 scopus 로고
    • Learning regular sets from queries and counterexamples
    • D. Angluin, "Learning Regular Sets from Queries and Counterexamples," Inf. Comput., vol.75, no. 2, 1987.
    • (1987) Inf. Comput. , vol.75 , Issue.2
    • Angluin, D.1
  • 66
    • 0003037529 scopus 로고
    • Reducibility among combinatorial problems
    • Plenum Press
    • R. M. Karp, ""Reducibility Among Combinatorial Problems"," in Complexity of Computer Computations. Plenum Press, 1972.
    • (1972) Complexity of Computer Computations
    • Karp, R.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.