“Using Attack Injection on Closed Protocols”
From Navigators
(Difference between revisions)
Jcraveiro (Talk | contribs)
(NavsPubsFull5.xml import (201201141459, full reimport with new ids for legacy pubs avoiding collisions))
(NavsPubsFull5.xml import (201201141459, full reimport with new ids for legacy pubs avoiding collisions))
Latest revision as of 14:40, 14 January 2013
João Antunes, Nuno Ferreira Neves, Paulo Veríssimo
in Fast Abstract in Supplement of the International Conference on Dependable Systems and Networks (DSN'10), Jun. 2010.
Abstract: Many network servers rely on the correctness and security of closed protocols. However, the unavailability of the protocol specification hinders any attempt to adequately test the implementations of that protocol. The paper addresses this problem by complementing an attack injection methodology with a protocol reverse engineering component. We introduce a new approach to automatically infer the message formats and the protocol state machine based only on network traces, without requiring access to the source code or binaries.
Download paper
Download Using Attack Injection on Closed Protocols
Export citation
Project(s):
Missing ResearchLine