,
, , pp.22-39, 1950.
, Potency
, Costs (absolute) Generation time, pp.137-95, 0119.
,
, Nb. transf, vol.1
, , pp.47-107, 0258.
, Potency
, Costs (absolute) Generation time, pp.30-33, 2003.
, REFERENCES
Marionette: A Programmable Network Traffic Obfuscation System, Proc. 24th USENIX Security Symp. USENIX Assoc, pp.367-382, 2015. ,
Reverse engineering and design recovery: a taxonomy, IEEE Software, vol.7, issue.1, pp.13-18, 1990. ,
DOI : 10.1109/52.43044
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler, 2008. ,
, Radare2 github repository, " https://github.com/radare/radare2, 2017.
A Survey of Automatic Protocol Reverse Engineering Tools, ACM Computing Surveys, vol.48, issue.3, p.40, 2015. ,
DOI : 10.1109/ICDMA.2012.125
A Survey on Methods of Automatic Protocol Reverse Engineering, 2011 Seventh International Conference on Computational Intelligence and Security, pp.685-689, 2011. ,
DOI : 10.1109/CIS.2011.156
State of the art of network protocol reverse engineering tools, Journal of Computer Virology and Hacking Techniques, vol.19, issue.2, pp.1-16, 2017. ,
DOI : 10.1007/978-3-319-26362-5
, Protocol Informatics Project, 2004.
, Network Protocol Analysis using Bioinformatics Algorithms, 2004.
Reverse Engineering of Protocols from Network Traces, 2011 18th Working Conference on Reverse Engineering, pp.169-178, 2011. ,
DOI : 10.1109/WCRE.2011.28
Towards automated protocol reverse engineering using semantic information, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, pp.51-62, 2014. ,
DOI : 10.1145/2590296.2590346
URL : https://hal.archives-ouvertes.fr/hal-01009283
Exploiting Semantic for the Automatic Reverse Engineering of Communication Protocols, 2014. ,
URL : https://hal.archives-ouvertes.fr/tel-01146797
Extracting Output Formats from Executables, 2006 13th Working Conference on Reverse Engineering, pp.167-178, 2006. ,
DOI : 10.1109/WCRE.2006.29
URL : http://cs.wisc.edu/~liblit/wcre-2006/wcre-2006.pdf
Dispatcher, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.621-634, 2009. ,
DOI : 10.1145/1653662.1653737
Grammar and model extraction for security applications using dynamic program binary analysis, 2010. ,
Automatic protocol reverse-engineering: Message format extraction and field semantics inference, Comput. Networks, pp.451-474, 2013. ,
DOI : 10.1016/j.comnet.2012.08.003
URL : http://www.cs.berkeley.edu/%7Edawnsong/papers/2012%20Automatic%20Protocol%20Reverse%20Engineering.pdf
Prospex: Protocol Specification Extraction, 2009 30th IEEE Symposium on Security and Privacy, pp.110-125, 2009. ,
DOI : 10.1109/SP.2009.14
URL : http://security.riit.tsinghua.edu.cn/mediawiki/images/8/87/Prospex-paper.pdf
Inference and analysis of formal models of botnet command and control protocols, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.426-439, 2010. ,
DOI : 10.1145/1866307.1866355
URL : http://www.cs.berkeley.edu/%7Edawnsong/papers/ccs10botnets.pdf
MACE: model-inference-assisted concolic exploration for protocol and vulnerability discovery, Proc. 20th USENIX Conf. Security, ser. SEC'11, p.19, 2011. ,
Polyglot, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.317-329, 2007. ,
DOI : 10.1145/1315245.1315286
ReFormat: Automatic Reverse Engineering of Encrypted Messages, Comput, pp.200-215, 2009. ,
DOI : 10.1109/SP.2009.14
URL : http://www.cs.berkeley.edu/~wdc/papers/reformat-esorics09.pdf
On the (im) possibility of obfuscating programs, Ann. Int'l Cryptology Conf, pp.1-18, 2001. ,
DOI : 10.1145/2160158.2160159
URL : http://www.cs.cmu.edu/afs/cs.cmu.edu/user/rudich/www/papers/obfuscators.ps
, On the (im)possibility of obfuscating programs, J. ACM, vol.59, issue.6, pp.1-6, 2012.
Assessing the Security Properties of Software Obfuscation, IEEE Security & Privacy, vol.14, issue.5, pp.80-83, 1997. ,
DOI : 10.1109/MSP.2016.112
Against intelligent tampering: Software tamper resistance by extended control flow obfuscation, Proc. World Multiconference on Systems, Cybern., and Informatics, 2001. ,
Manufacturing cheap, resilient, and stealthy opaque constructs, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, pp.184-196, 1998. ,
DOI : 10.1145/268946.268962
Software obfuscation on a theoretical basis and its implementation, IEICE Trans. Fundamentals of Electron., Commun. and Comput. Sci, vol.86, issue.1, pp.176-186, 2003. ,
Software tamper resistance: Obstructing static analysis of programs, 2000. ,
General method of program code obfuscation, Ph.D. dissertation, Inst. of Eng. Cybern, 2002. ,
Obfuscation of executable code to improve resistance to static disassembly, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, pp.290-299, 2003. ,
DOI : 10.1145/948109.948149
A general model for hiding control flow, Proceedings of the tenth annual ACM workshop on Digital rights management, DRM '10, pp.35-42, 2010. ,
DOI : 10.1145/1866870.1866877
Code Obfuscation against Static and Dynamic Reverse Engineering, Inform. Hiding, pp.270-284, 2011. ,
DOI : 10.1007/978-3-540-77360-3_17
A survey on automated dynamic malware-analysis techniques and tools, ACM Computing Surveys, vol.44, issue.2, p.6, 2012. ,
DOI : 10.1145/2089125.2089126
Data tainting and obfuscation: Improving plausibility of incorrect taint, 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM), pp.111-120, 2015. ,
DOI : 10.1109/SCAM.2015.7335407
URL : https://hal.archives-ouvertes.fr/hal-01193286
ScrambleSuit, Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, WPES '13, pp.213-224, 2013. ,
DOI : 10.1145/2517840.2517856
, , 2017.
StegoTorus, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.109-120, 2012. ,
DOI : 10.1145/2382196.2382211
SkypeMorph, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12 ,
DOI : 10.1145/2382196.2382210
Security, ser. CCS '12, pp.97-108, 2012. ,
Cover your ACKs, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.361-372, 2013. ,
DOI : 10.1145/2508859.2516742
I want my voice to be heard: Ip over voice-over-ip for unobservable censorship circumvention, NDSS, 2013. ,
Facet, Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES '14, pp.163-172, 2014. ,
DOI : 10.1145/2382196.2382211
Games Without Frontiers: Investigating Video Games as a Covert Channel, Proc. 2016 IEEE European Symp. Security and Privacy, ser. IEEE European Symp. Security and Privacy, 2015. ,
Protocol misidentification made easy with format-transforming encryption, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.61-72, 2013. ,
DOI : 10.1145/2508859.2516657
Grammatical Inference: Learning Automata and Grammars, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-00476128
Open modbus/tcp specification, Tech. Rep, 1999. ,
Hypertext transfer protocol (http/1.1): Message syntax and routing, Internet Eng. Task Force, Tech. Rep, 2014. ,
DOI : 10.17487/rfc7230