On the Performance Evaluation of Protocol State Machine Reverse Engineering Methods
Having access to the specifications of network protocols is essential for several reasons in IT security. When the specifications are not known, one may turn to protocol reverse engineering methods to reconstruct these, typically by analysing recorded network traffic or inspecting an executable that...
Main Authors: | Gergo Ladi, Tamas Holczer |
---|---|
Format: | Article |
Language: | English |
Published: |
Croatian Communications and Information Society (CCIS)
2024-03-01
|
Series: | Journal of Communications Software and Systems |
Subjects: | |
Online Access: | https://jcoms.fesb.unist.hr/10.24138/jcomss-2023-0149/ |
Similar Items
-
Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART
by: Geonbae Na, et al.
Published: (2016-08-01) -
Estimating runtime of a job in Hadoop MapReduce
by: Narges Peyravi, et al.
Published: (2020-07-01) -
HSCoNAS : hardware-software co-design of efficient DNNs via neural architecture search
by: Luo, Xiangzhong, et al.
Published: (2022) -
Precise and Comprehensive Provenance Tracking for Android Devices
by: Gordon, Michael, et al.
Published: (2019) -
Improving microservice-based applications with runtime placement adaptation
by: Adalberto R. Sampaio, et al.
Published: (2019-02-01)