Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/SP.2009.14guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Prospex: Protocol Specification Extraction

Published: 17 May 2009 Publication History

Abstract

Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very useful in a number of security-related contexts, for example, to perform deep packet inspection and black-box fuzzing, or to quickly understand custom botnet command and control (C\&C) channels.Since manual reverse engineering is a time-consuming and tedious process, a number of systems have been proposed that aim to automate this task. These systems either analyze network traffic directly or monitor the execution of the application that receives the protocol messages. While previous systems show that precise message formats can be extracted automatically, they do not provide a protocol specification.The reason is that they do not reverse engineer the protocol state machine.In this paper, we focus on closing this gap by presenting a system that is capable of automatically inferring state machines. This greatly enhances the results of automatic protocol reverse engineering, while further reducing the need for human interaction. We extend previous work that focuses on behavior-based message format extraction,and introduce techniques for identifying and clustering different types of messages not only based on their structure, but also according to the impact of each message on server behavior.Moreover, we present an algorithm for extracting the state machine.We have applied our techniques to a number of real-world protocols, including the command and control protocol used by a malicious bot. Our results demonstrate that we are able to extract format specifications for different types of messages and meaningful protocol state machines. We use these protocol specifications to automatically generate input for a stateful fuzzer,allowing us to discover security vulnerabilities in real-world applications.

Cited By

View all
  • (2024)A Survey of Protocol FuzzingACM Computing Surveys10.1145/369678857:2(1-36)Online publication date: 10-Oct-2024
  • (2024)POSTER: Packet Field Tree: a hybrid approach, open database and evaluation methodology for Automated Protocol Reverse-EngineeringProceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos10.1145/3672202.3673718(13-15)Online publication date: 4-Aug-2024
  • (2024)BinPRE: Enhancing Field Inference in Binary Analysis Based Protocol Reverse EngineeringProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690299(3689-3703)Online publication date: 2-Dec-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
SP '09: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
May 2009
382 pages
ISBN:9780769536330

Publisher

IEEE Computer Society

United States

Publication History

Published: 17 May 2009

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Survey of Protocol FuzzingACM Computing Surveys10.1145/369678857:2(1-36)Online publication date: 10-Oct-2024
  • (2024)POSTER: Packet Field Tree: a hybrid approach, open database and evaluation methodology for Automated Protocol Reverse-EngineeringProceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos10.1145/3672202.3673718(13-15)Online publication date: 4-Aug-2024
  • (2024)BinPRE: Enhancing Field Inference in Binary Analysis Based Protocol Reverse EngineeringProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690299(3689-3703)Online publication date: 2-Dec-2024
  • (2024)Automated Testing of Networked Systems ReliabilityProceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3650212.3685559(1920-1922)Online publication date: 11-Sep-2024
  • (2023)NSFuzz: Towards Efficient and State-Aware Network Service FuzzingACM Transactions on Software Engineering and Methodology10.1145/358059832:6(1-26)Online publication date: 31-Mar-2023
  • (2023)Lifting Network Protocol Implementation to Precise Format Specification with Security ApplicationsProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616614(1287-1301)Online publication date: 15-Nov-2023
  • (2022)Network Communication Protocol Reverse Engineering Based on Auto-EncoderSecurity and Communication Networks10.1155/2022/29244792022Online publication date: 1-Jan-2022
  • (2022)StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy GuidanceProceedings of the 38th Annual Computer Security Applications Conference10.1145/3564625.3564650(756-768)Online publication date: 5-Dec-2022
  • (2022)The Closer You Look, The More You LearnProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3559365(2265-2278)Online publication date: 7-Nov-2022
  • (2022)Enabling passive measurement of zoom performance in production networksProceedings of the 22nd ACM Internet Measurement Conference10.1145/3517745.3561414(244-260)Online publication date: 25-Oct-2022
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media