all InfoSec News
Extracting Protocol Format as State Machine via Controlled Static Loop Analysis
July 2, 2024, 4:14 a.m. | Qingkai Shi, Xiangzhe Xu, Xiangyu Zhang
cs.CR updates on arXiv.org arxiv.org
Abstract: Reverse engineering of protocol message formats is critical for many security applications. Mainstream techniques use dynamic analysis and inherit its low-coverage problem -- the inferred message formats only reflect the features of their inputs. To achieve high coverage, we choose to use static analysis to infer message formats from the implementation of protocol parsers. In this work, we focus on a class of extremely challenging protocols whose formats are described via constraint-enhanced regular …
analysis applications arxiv critical cs.cr cs.pl cs.se dynamic dynamic analysis engineering features high inputs loop low machine mainstream message problem protocol reverse reverse engineering security state state machine static static analysis techniques
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Senior Software Java Developer
@ Swiss Re | Madrid, M, ES
Product Owner (Hybrid) - 19646
@ HII | Fort Belvoir, VA, Virginia, United States
Sr. Operations Research Analyst
@ HII | Albuquerque, NM, New Mexico, United States
Lead SME Platform Architect
@ General Dynamics Information Technology | USA VA Falls Church - 3150 Fairview Park Dr (VAS095)
DevOps Engineer (Hybrid) - 19526
@ HII | San Antonio, TX, Texas, United States
Cloud Platform Engineer (Hybrid) - 19535
@ HII | Greer, SC, South Carolina, United States