Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/WCRE.2007.6guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A Reverse Engineering Tool for Extracting Protocols of Networked Applications

Published: 28 October 2007 Publication History

Abstract

Networked applications play a significant role in today's interconnected world. It is important for software engineers to be able to understand and model the behavior of these applications during software maintenance. Some networked applications use legacy protocols in ways they were not in- tended to be used. Others use newly created protocols that are designed in an ad hoc way to simply meet requirements. Protocol usage needs to be understood so that applications can be effectively tested and maintained. In this paper we propose the first step in achieving this goal by presenting a dynamic analysis tool, called PEXT, that can reverse engi- neer a networked application's underlying protocol by ana- lyzing a collection of packets captured from the application at runtime. We demonstrate the effectiveness of this tool by extracting a protocol from an FTP application, and compar- ing the extracted protocol to the documented FTP protocol defined in RFC 959.

Cited By

View all
  • (2023)Extracting protocol format as state machine via controlled static loop analysisProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620630(7019-7036)Online publication date: 9-Aug-2023
  • (2023)Lifting Network Protocol Implementation to Precise Format Specification with Security ApplicationsProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616614(1287-1301)Online publication date: 15-Nov-2023
  • (2022)Network Communication Protocol Reverse Engineering Based on Auto-EncoderSecurity and Communication Networks10.1155/2022/29244792022Online publication date: 1-Jan-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
WCRE '07: Proceedings of the 14th Working Conference on Reverse Engineering
October 2007
299 pages
ISBN:0769530346

Publisher

IEEE Computer Society

United States

Publication History

Published: 28 October 2007

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Extracting protocol format as state machine via controlled static loop analysisProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620630(7019-7036)Online publication date: 9-Aug-2023
  • (2023)Lifting Network Protocol Implementation to Precise Format Specification with Security ApplicationsProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616614(1287-1301)Online publication date: 15-Nov-2023
  • (2022)Network Communication Protocol Reverse Engineering Based on Auto-EncoderSecurity and Communication Networks10.1155/2022/29244792022Online publication date: 1-Jan-2022
  • (2021)Protocol Reverse-Engineering Methods and ToolsComputer Communications10.1016/j.comcom.2021.11.009182:C(238-254)Online publication date: 29-Dec-2021
  • (2018)A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs ViewSecurity and Communication Networks10.1155/2018/83703412018Online publication date: 20-Feb-2018
  • (2017)Automatic Reverse Engineering of Private Flight Control Protocols of UAVsSecurity and Communication Networks10.1155/2017/13080452017Online publication date: 4-Jul-2017
  • (2015)A Survey of Automatic Protocol Reverse Engineering ToolsACM Computing Surveys10.1145/284072448:3(1-26)Online publication date: 9-Dec-2015
  • (2011)Automatically complementing protocol specifications from network tracesProceedings of the 13th European Workshop on Dependable Computing10.1145/1978582.1978601(87-92)Online publication date: 11-May-2011
  • (2011)Finding relevant answers in software forumsProceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering10.1109/ASE.2011.6100069(323-332)Online publication date: 6-Nov-2011
  • (2009)Automated Behavioral FingerprintingProceedings of the 12th International Symposium on Recent Advances in Intrusion Detection10.1007/978-3-642-04342-0_10(182-201)Online publication date: 1-Oct-2009
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media