A Survey on Methods of Automatic Protocol Reverse Engineering
Protocol reverse engineering is necessary for many security applications, and has been an important and active research topic. This paper makes a survey on automatic protocol reverse engineering, especially on the goals, methods, tools and their achievements. The targets and obstacles in automatic p...
Saved in:
Published in | 2011 Seventh International Conference on Computational Intelligence and Security pp. 685 - 689 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.12.2011
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Protocol reverse engineering is necessary for many security applications, and has been an important and active research topic. This paper makes a survey on automatic protocol reverse engineering, especially on the goals, methods, tools and their achievements. The targets and obstacles in automatic protocol reverse engineering are identified. Then the evolution of the technique and tools proposed for protocol reverse engineering are reviewed chronologically. Finally we summarize those difficulties and problems that are still open to solve, and envision the prospects of this field. |
---|---|
ISBN: | 9781457720086 1457720086 |
DOI: | 10.1109/CIS.2011.156 |