On the Performance Evaluation of Protocol State Machine Reverse Engineering Methods
Having access to the specifications of network protocols is essential for several reasons in IT security. When the specifications are not known, one may turn to protocol reverse engineering methods to reconstruct these, typically by analysing recorded network traffic or inspecting an executable that...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Croatian Communications and Information Society (CCIS)
2024-03-01
|
Series: | Journal of Communications Software and Systems |
Subjects: | |
Online Access: | https://jcoms.fesb.unist.hr/10.24138/jcomss-2023-0149/ |