Jan. 11, 2023, 2:10 a.m. | Stephan Kleber, Milan Stute, Matthias Hollick, Frank Kargl

cs.CR updates on arXiv.org arxiv.org

Reverse engineering of unknown network protocols based on recorded traffic
traces enables security analyses and debugging of undocumented network
services. In particular for binary protocols, existing approaches (1) lack
comprehensive methods to classify or determine the data type of a discovered
segment in a message, e.,g., a number, timestamp, or network address, that
would allow for a semantic interpretation and (2) have strong assumptions that
prevent analysis of lower-layer protocols often found in IoT or mobile systems.
In this paper, …

address analysis binary classification data debugging engineering message network protocols recognition reverse reverse engineering security segment services traces traffic

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

IT Security Manager

@ Teltonika | Vilnius/Kaunas, VL, LT

Security Officer - Part Time - Harrah's Gulf Coast

@ Caesars Entertainment | Biloxi, MS, United States

DevSecOps Full-stack Developer

@ Peraton | Fort Gordon, GA, United States

Cybersecurity Cooperation Lead

@ Peraton | Stuttgart, AE, United States

Cybersecurity Engineer - Malware & Forensics

@ ManTech | 201DU - Customer Site,Herndon, VA