Back to Results
First PageMeta Content
Network protocols / Data transmission / Inter-process communication / Communications protocol / Protocols / Server Message Block / Cluster analysis / Hierarchical clustering / Email / Computing / Statistics / Data


Towards Automated Protocol Reverse Engineering Using Semantic Information Georges Bossert*† Frédéric Guihéry*
Add to Reading List

Document Date: 2014-07-01 03:28:58


Open Document

File Size: 822,48 KB

Share Result on Facebook

City

Palo Alto / Kyoto / Paxson / /

Company

Computer-Communication Networks / Pearson / HP / Commercial Laboratory / Veritas / /

Currency

USD / /

/

Event

FDA Phase / Reorganization / Company Expansion / /

IndustryTerm

results on complex protocols / pre-computing steps / university network / voice communications / confined and controlled network infrastructure / text protocol / network security products / botnet protocol / binary protocol / security products / communication protocol / targeted protocols / sequence alignment algorithms / hierarchical clustering algorithm / heuristic clustering algorithm / evaluation network / open-source protocol / encoding that exists in real protocols / protocol inference algorithms / undocumented protocols / inference algorithm / software implementation / robustness audit / inference algorithms / cryptographic algorithms / unknown protocols / state-ofthe-art tools / communication protocols / deobfuscation algorithm / sequence alignment algorithm / malware protocols / stateof-the-art solutions / antiinstrumentation solutions / alignment algorithm / /

OperatingSystem

Linux / Android / /

Person

W. Cui / V / Georges Bossert / Guillaume Hiet / Frédéric Guihéry / /

Position

actor / author / representative / /

Product

this / Ventrilo3 / some / P2P / /

ProgrammingLanguage

C / Python / /

ProvinceOrState

North Carolina / /

SportsEvent

formula 1 / /

Technology

Virtual Machine / P2P botnet protocol / bioinformatics / inference algorithms / SMS / IRC protocol / often undocumented protocols / Linux / API / GPS / open-source protocol / clustering algorithm / inference algorithm / P2P / modified NW algorithm / command line interface / sequence alignment algorithms / known protocol / Android / P2P protocol / UDP / UPGMA algorithm / protocol inference algorithms / two unknown protocols / sequence alignment algorithm / little-endian / encryption / hierarchical clustering algorithm / cryptography / binary protocol / DNS / heuristic clustering algorithm / P2P communication protocol / alignment algorithm / ASCII / NW algorithm / communication protocol / SMB protocol / P2P ZeroAccess protocol / HTTP / undocumented VoIP protocol / simulation / communication protocols / targeted protocols / malware protocols / VOIP / cryptographic algorithms / deobfuscation algorithm / text protocol / Network Protocols / /

URL

www.ventrilo.com / http /

SocialTag