{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:40:15Z","timestamp":1725882015932},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319548753"},{"type":"electronic","value":"9783319548760"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-54876-0_11","type":"book-chapter","created":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T04:36:57Z","timestamp":1488343017000},"page":"139-144","source":"Crossref","is-referenced-by-count":1,"title":["Protocol Reverse Engineering: Challenges and Obfuscation"],"prefix":"10.1007","author":[{"given":"J.","family":"Duch\u00eane","sequence":"first","affiliation":[]},{"given":"C.","family":"Le Guernic","sequence":"additional","affiliation":[]},{"given":"E.","family":"Alata","sequence":"additional","affiliation":[]},{"given":"V.","family":"Nicomette","sequence":"additional","affiliation":[]},{"given":"M.","family":"Ka\u00e2niche","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,2]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Antunes, J., Neves, N., Verissimo, P.: Reverse engineering of protocols from network traces. In: 2011 18th Working Conference on Reverse Engineering (WCRE), pp. 169\u2013178. IEEE, New York (2011)","DOI":"10.1109\/WCRE.2011.28"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Bossert, G., Hiet, G., Henin, T.: Modelling to simulate botnet command and control protocols for the evaluation of network intrusion detection systems. In: 2011 Conference on Network and Information Systems Security (SAR-SSI), pp. 1\u20138. IEEE, La Rochelle (2011)","DOI":"10.1109\/SAR-SSI.2011.5931397"},{"key":"11_CR3","unstructured":"Bossert, G.: Exploiting semantic for the automatic reverse engineering of communication protocols. Ph.D. Thesis, Suplec December 2014"},{"key":"11_CR4","unstructured":"Bridger, H., Rishab, N., Phillipa, G., Rob, J.: Games without frontiers: investigating video games as a covert channel. In: Proceedings of the 2016 IEEE European Symposium on Security and Privacy, IEEE European Symposium on Security and Privacy. IEEE (2015)"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Caballero, J., Poosankam, P., Kreibich, C., Song, D.: Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 621\u2013634. ACM, New York (2009)","DOI":"10.1145\/1653662.1653737"},{"key":"11_CR6","unstructured":"Caballero, J., Song, D.: Rosetta: extracting protocol semantics using binary analysis with applications to protocol replay and NAT rewriting. Technical Report CMU-CyLab-07-014, Carnegie Mellon University, Pittsburgh, USA (2007)"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Caballero, J., Yin, H., Liang, Z., Song, D.: Polyglot: automatic extraction of protocol message format using dynamic binary analysis. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 317\u2013329. ACM, New York (2007)","DOI":"10.1145\/1315245.1315286"},{"key":"11_CR8","unstructured":"Caballero Bayerri, J.: Grammar and model extraction for security applications using dynamic program binary analysis. Ph.D. Thesis, Carnegie Mellon University, Pittsburgh, PA, USA (2010)"},{"key":"11_CR9","unstructured":"Cui, W., Paxson, V., Weaver, N., Katz, R.H.: Protocol-independent adaptive replay of application dialog. In: Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS). Internet Society, San Diego, USA, February 2006. http:\/\/research.microsoft.com\/apps\/pubs\/default.aspx?id=153197"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Cui, W., Peinado, M., Chen, K., Wang, H.J., Irun-Briz, L.: Tupni: automatic reverse engineering of input formats. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS 2008, pp. 391\u2013402. ACM, New York (2008)","DOI":"10.1145\/1455770.1455820"},{"key":"11_CR11","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139194655","volume-title":"Grammatical Inference: Learning Automata and Grammars","author":"C Higuera de la","year":"2010","unstructured":"de la Higuera, C.: Grammatical Inference: Learning Automata and Grammars. Cambridge University Press, New York (2010)"},{"key":"11_CR12","unstructured":"Hjelmvik, E., John, W.: Breaking and Improving Protocol Obfuscation. Technical Report 2010\u201305, Chalmers University of Technology, Gothenburg, Sweden (2010). http:\/\/publications.lib.chalmers.se\/cpl\/record\/index.xsql?pubid=123751"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Leita, C., Mermoud, K., Dacier, M.: ScriptGen: an automated script generation tool for Honeyd. In: 21st Annual Computer Security Applications Conference, p. 214. IEEE, Tucson (2005)","DOI":"10.1109\/CSAC.2005.49"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Li, X., Chen, L.: A survey on methods of automatic protocol reverse engineering. In: 2011 Seventh International Conference on Computational Intelligence and Security (CIS), pp. 685\u2013689. IEEE, Hainan (2011)","DOI":"10.1109\/CIS.2011.156"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Newsome, J., Brumley, D., Franklin, J., Song, D.: Replayer: automatic protocol replay by binary analysis. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 311\u2013321. ACM, New York (2006)","DOI":"10.1145\/1180405.1180444"},{"key":"11_CR16","unstructured":"Samba Team: Opening windows to a wider world. http:\/\/www.samba.org"}],"container-title":["Lecture Notes in Computer Science","Risks and Security of Internet and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-54876-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T07:38:57Z","timestamp":1498376337000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-54876-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319548753","9783319548760"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-54876-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}