Automatic Network Protocol Automaton Extraction
暂无分享,去创建一个
[1] Xuxian Jiang,et al. Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution , 2008, NDSS.
[2] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[3] Alfred V. Aho,et al. Compilers: Principles, Techniques, and Tools , 1986, Addison-Wesley series in computer science / World student series edition.
[4] Helen J. Wang,et al. Discoverer: Automatic Protocol Reverse Engineering from Network Traces , 2007, USENIX Security Symposium.
[5] Bell Telephone,et al. Regular Expression Search Algorithm , 1968 .
[6] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .
[7] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[8] Polyglot : Automatic Extraction of Protocol Format using Dynamic Binary Analysis , 2007 .
[9] Ken Thompson,et al. Programming Techniques: Regular expression search algorithm , 1968, Commun. ACM.
[10] Laurent Miclet,et al. Applying Grammatical Inference in Learning a Language Model for Oral Dialogue , 1998, ICGI.
[11] N. Prieto,et al. Automatic learning of structural language models , 1991, [Proceedings] ICASSP 91: 1991 International Conference on Acoustics, Speech, and Signal Processing.
[12] Anil K. Jain,et al. Small Sample Size Effects in Statistical Pattern Recognition: Recommendations for Practitioners , 1991, IEEE Trans. Pattern Anal. Mach. Intell..
[13] Enrique Vidal,et al. Learning Regular Grammars to Model Musical Style: Comparing Different Coding Schemes , 1998, ICGI.
[14] Pedro P. Cruz-Alcázar,et al. A study of Grammatical Inference Algorithms in Automatic Music Composition and Musical Style Recognition. , 1997 .
[15] Pedro P. Cruz-Alcázar,et al. Modeling musical style using grammatical inference techniques: a tool for classifying and generating melodies , 2003, Proceedings Third International Conference on WEB Delivering of Music.
[16] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[17] Enrique Vidal,et al. Application of the error-correcting grammatical inference algorithm (ECGI) to planar shape recognition , 1993 .
[18] Zhenkai Liang,et al. Polyglot: automatic extraction of protocol message format using dynamic binary analysis , 2007, CCS '07.
[19] Enrique Vidal,et al. Learning accurate finite-state structural models of words through the ECGI algorithm , 1989, International Conference on Acoustics, Speech, and Signal Processing,.
[20] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[21] Christopher Krügel,et al. Automatic Network Protocol Analysis , 2008, NDSS.
[22] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[23] H. Rulot,et al. An efficient algorithm for the inference of circuit-free automata , 1988 .