Abstract
|
Many network servers rely on the correctne … Many network servers rely on the correctness and security of closed protocols. However, the unavailability of the protocol specification hinders any attempt to adequately test the implementations of that protocol. The paper addresses this problem by complementing an attack injection methodology with a protocol reverse engineering component. We introduce a new approach to automatically infer the message formats and the protocol state machine based only on network traces, without requiring access to the source code or binaries. ing access to the source code or binaries.
|
Author
|
João Antunes +
, Nuno Ferreira Neves +
, Paulo Verissimo +
|
Booktitle
|
Fast Abstract in Supplement of the International Conference on Dependable Systems and Networks (DSN'10) +
|
Key
|
Antunes10b +
|
Missing
|
ResearchLine +
|
Month
|
jun +
|
NumPubDate
|
2,010.06 +
|
Title
|
Using Attack Injection on Closed Protocols +
|
Type
|
inproceedings +
|
Url
|
http://www.navigators.di.fc.ul.pt/archive/papers/DSN10-FastAbstract.pdf +
|
Year
|
2010 +
|
Categories |
Publication +
|
Modification dateThis property is a special property in this wiki.
|
14 January 2013 14:40:57 +
|