A Survey on Methods of Automatic Protocol Reverse Engineering

Protocol reverse engineering is necessary for many security applications, and has been an important and active research topic. This paper makes a survey on automatic protocol reverse engineering, especially on the goals, methods, tools and their achievements. The targets and obstacles in automatic p...

Full description

Saved in:
Bibliographic Details
Published in2011 Seventh International Conference on Computational Intelligence and Security pp. 685 - 689
Main Authors XiangDong Li, Li Chen
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.12.2011
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Protocol reverse engineering is necessary for many security applications, and has been an important and active research topic. This paper makes a survey on automatic protocol reverse engineering, especially on the goals, methods, tools and their achievements. The targets and obstacles in automatic protocol reverse engineering are identified. Then the evolution of the technique and tools proposed for protocol reverse engineering are reviewed chronologically. Finally we summarize those difficulties and problems that are still open to solve, and envision the prospects of this field.
ISBN:9781457720086
1457720086
DOI:10.1109/CIS.2011.156