Cited By
View all- Shi QXu XZhang XCalandrino JTroncoso C(2023)Extracting protocol format as state machine via controlled static loop analysisProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620630(7019-7036)Online publication date: 9-Aug-2023
- Shi QShao JYe YZheng MZhang XMeng WJensen CCremers CKirda E(2023)Lifting Network Protocol Implementation to Precise Format Specification with Security ApplicationsProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616614(1287-1301)Online publication date: 15-Nov-2023
- Yu TXin YTao YHou BZhu H(2022)Network Communication Protocol Reverse Engineering Based on Auto-EncoderSecurity and Communication Networks10.1155/2022/29244792022Online publication date: 1-Jan-2022
- Show More Cited By