On the Performance Evaluation of Protocol State Machine Reverse Engineering Methods

Having access to the specifications of network protocols is essential for several reasons in IT security. When the specifications are not known, one may turn to protocol reverse engineering methods to reconstruct these, typically by analysing recorded network traffic or inspecting an executable that...

Full description

Bibliographic Details
Main Authors: Gergo Ladi, Tamas Holczer
Format: Article
Language:English
Published: Croatian Communications and Information Society (CCIS) 2024-03-01
Series:Journal of Communications Software and Systems
Subjects:
Online Access:https://jcoms.fesb.unist.hr/10.24138/jcomss-2023-0149/