Nov. 9, 2022, 2:20 a.m. | Stephan Kleber, Rens Wouter van der Heijden, Frank Kargl

cs.CR updates on arXiv.org arxiv.org

Protocol reverse engineering based on traffic traces infers the behavior of
unknown network protocols by analyzing observable network messages. To perform
correct deduction of message semantics or behavior analysis, accurate message
type identification is an essential first step. However, identifying message
types is particularly difficult for binary protocols, whose structural features
are hidden in their densely packed data representation. We leverage the
intrinsic structural features of binary protocols and propose an accurate
method for discriminating message types.


Our approach uses …

binary continuous identification message network protocols segment similarity

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Cyber Systems Administration

@ Peraton | Washington, DC, United States

Android Security Engineer, Public Sector

@ Google | Reston, VA, USA

Lead Electronic Security Engineer, CPP - Federal Facilities - Hybrid

@ Black & Veatch | Denver, CO, US

Profissional Sênior de Compliance & Validação em TI - Montes Claros (MG)

@ Novo Nordisk | Montes Claros, Minas Gerais, BR

Principal Engineer, Product Security Engineering

@ Google | Sunnyvale, CA, USA