ReFormat: Automatic Reverse Engineering of Encrypted Messages
暂无分享,去创建一个
Zhi Wang | Xuxian Jiang | Xinyuan Wang | Mike Grace | Weidong Cui | Michael C. Grace | Weidong Cui | Xuxian Jiang | Zhi Wang | Xinyuan Wang
[1] David Brumley,et al. Replayer: automatic protocol replay by binary analysis , 2006, CCS '06.
[2] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[3] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[4] Tal Garfinkel,et al. Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation , 2005, USENIX Security Symposium.
[5] Helen J. Wang,et al. Discoverer: Automatic Protocol Reverse Engineering from Network Traces , 2007, USENIX Security Symposium.
[6] Randy H. Katz,et al. Protocol-Independent Adaptive Replay of Application Dialog , 2006, NDSS.
[7] Patrice Godefroid,et al. Automated Whitebox Fuzz Testing , 2008, NDSS.
[8] Helen J. Wang,et al. ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[9] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[10] Xuxian Jiang,et al. Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution , 2008, NDSS.
[11] Zhenkai Liang,et al. Polyglot: automatic extraction of protocol message format using dynamic binary analysis , 2007, CCS '07.
[12] Helen J. Wang,et al. Shield: vulnerability-driven network filters for preventing known vulnerability exploits , 2004, SIGCOMM.
[13] Polyglot : Automatic Extraction of Protocol Format using Dynamic Binary Analysis , 2007 .
[14] Marc Dacier,et al. ScriptGen: an automated script generation tool for Honeyd , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[15] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.
[16] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[17] Christopher Krügel,et al. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis , 2007, NDSS.
[18] Helen J. Wang,et al. Tupni: automatic reverse engineering of input formats , 2008, CCS.
[19] Jun Xu,et al. Packet vaccine: black-box exploit detection and signature generation , 2006, CCS '06.
[20] Yunheung Paek,et al. Advances in Computer Systems Architecture , 2008 .
[21] Heng Yin,et al. Dynamic Spyware Analysis , 2007, USENIX Annual Technical Conference.
[22] Christopher Krügel,et al. Prospex: Protocol Specification Extraction , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[23] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[24] Marc Dacier,et al. Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots , 2006, RAID.
[25] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .
[26] Christopher Krügel,et al. Automatic Network Protocol Analysis , 2008, NDSS.
[27] Frederic T. Chong,et al. Minos: Architectural support for protecting control data , 2006, TACO.