메뉴 건너뛰기




Volumn , Issue , 2007, Pages 317-329

Polyglot: Automatic extraction of protocol message format using dynamic binary analysis

Author keywords

Binary analysis; Protocol reverse engineering

Indexed keywords

APPLICATION DATA; APPLICATION-LEVEL PROTOCOL; AUTOMATIC EXTRACTION; BINARY ANALYSIS; DIFFERENT PROTOCOLS; MESSAGE FORMAT; NEW APPROACHES; PROGRAM BINARY; PROTOCOL ANALYZERS; PROTOCOL MESSAGE; PROTOCOL PROCESS; PROTOCOL SPECIFICATIONS; REAL-WORLD; SEMANTIC INFORMATION; WEALTH OF INFORMATION; WIRESHARK;

EID: 77952403312     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1315245.1315286     Document Type: Conference Paper
Times cited : (359)

References (37)
  • 1
    • 77952361467 scopus 로고    scopus 로고
    • How Samba Was Written
    • How Samba Was Written. http://samba.org/ftp/tridge/misc/french.cafe.txt.
  • 2
    • 77952331991 scopus 로고    scopus 로고
    • Icqlib: The ICQ Library
    • Icqlib: The ICQ Library. http://kicq.sourceforge.net/icqlib.shtml.
  • 3
    • 77952370826 scopus 로고    scopus 로고
    • Libyahoo2: A C Library for Yahoo! Messenger
    • Libyahoo2: A C Library for Yahoo! Messenger. http://libyahoo2. sourceforge.net.
  • 4
    • 77952395558 scopus 로고    scopus 로고
    • MSN Messenger Protocol
    • MSN Messenger Protocol. http://www.hypothetic.org/docs/msn/index.php.
  • 5
    • 77952404530 scopus 로고    scopus 로고
    • Qemu: Open Source Processor Emulator
    • Qemu: Open Source Processor Emulator. http://fabrice.bellard.free.fr/ qemu/.
  • 6
    • 77952385657 scopus 로고    scopus 로고
    • Tcpdump
    • Tcpdump. http://www.tcpdump.org/.
  • 7
    • 77952325433 scopus 로고    scopus 로고
    • UnOfficial AIM/OSCAR Protocol Specification
    • The UnOfficial AIM/OSCAR Protocol Specification. http://www.oilcan.org/ oscar/.
  • 8
    • 77952382556 scopus 로고    scopus 로고
    • Wireshark, Network Protocol Analyzer
    • Wireshark, Network Protocol Analyzer. http://www.wireshark.org.
  • 11
    • 85077688456 scopus 로고    scopus 로고
    • Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
    • Boston, MA, August
    • D. Brumley, J. Caballero, Z. Liang, J. Newsome, and D. Song. Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation. USENIX Security Symposium, Boston, MA, August 2007.
    • (2007) USENIX Security Symposium
    • Brumley, D.1    Caballero, J.2    Liang, Z.3    Newsome, J.4    Song, D.5
  • 17
    • 84893143817 scopus 로고    scopus 로고
    • Discoverer: Automatic protocol description generation from network traces
    • Boston, MA, August
    • W. Cui, J. Kannan, and H. J. Wang. Discoverer: Automatic Protocol Description Generation from Network Traces. USENIX Security Symposium, Boston, MA, August 2007.
    • (2007) USENIX Security Symposium
    • Cui, W.1    Kannan, J.2    Wang, H.J.3
  • 19
    • 85077692116 scopus 로고    scopus 로고
    • Dynamic application-layer protocol analysis for network intrusion detection
    • Vancouver, Canada, July
    • H. Dreger, A. Feldmann, M. Mai, V. Paxson, and R. Sommer. Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection. USENIX Security Symposium, Vancouver, Canada, July 2006.
    • (2006) USENIX Security Symposium
    • Dreger, H.1    Feldmann, A.2    Mai, M.3    Paxson, V.4    Sommer, R.5
  • 22
    • 34547427252 scopus 로고    scopus 로고
    • Semi-automated discovery of application session structure
    • Rio de Janeiro, Brazil, October
    • J. Kannan, J. Jung, V. Paxson, and C. E. Koksal. Semi-Automated Discovery of Application Session Structure. Internet Measurement Conference, Rio de Janeiro, Brazil, October 2006.
    • (2006) Internet Measurement Conference
    • Kannan, J.1    Jung, J.2    Paxson, V.3    Koksal, C.E.4
  • 28
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • San Diego, CA, February
    • J. Newsome and D. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. Network and Distributed System Security Symposium, San Diego, CA, February 2005.
    • (2005) Network and Distributed System Security Symposium
    • Newsome, J.1    Song, D.2
  • 29
    • 34548729485 scopus 로고    scopus 로고
    • Vulnerability-specific execution filtering for exploit prevention on commodity software
    • San Diego, CA, February
    • J. Newsome, D. Brumley, and D. Song. Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software. Network and Distributed System Security Symposium, San Diego, CA, February 2006.
    • (2006) Network and Distributed System Security Symposium
    • Newsome, J.1    Brumley, D.2    Song, D.3
  • 31
    • 17444400103 scopus 로고    scopus 로고
    • Violating assumptions with fuzzing
    • March
    • P. Oehlert. Violating Assumptions with Fuzzing. IEEE Security and Privacy, 3 (2), March 2005.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.2
    • Oehlert, P.1
  • 33
    • 34547396634 scopus 로고    scopus 로고
    • Binpac: A yacc for writing application protocol parsers
    • Rio de Janeiro, Brazil, October
    • R. Pang, V. Paxson, R. Sommer, and L. Peterson. Binpac: A Yacc for Writing Application Protocol Parsers. Internet Measurement Conference, Rio de Janeiro, Brazil, October 2006.
    • (2006) Internet Measurement Conference
    • Pang, R.1    Paxson, V.2    Sommer, R.3    Peterson, L.4
  • 34
    • 85101182647 scopus 로고    scopus 로고
    • Argos: An emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation
    • October
    • G. Portokalidis, A. Slowinska, and H. Bos. Argos: An Emulator for Fingerprinting Zero-Day Attacks for Advertised Honeypots with Automatic Signature Generation. ACM SIGOPS Operating Systems Review, 40 (4), October 2006.
    • (2006) ACM SIGOPS Operating Systems Review , vol.40 , Issue.4
    • Portokalidis, G.1    Slowinska, A.2    Bos, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.