Protocol Reverse-Engineering Methods and Tools: A Survey

被引:26
作者
Huang, Yuyao [1 ]
Shu, Hui [1 ]
Kang, Fei [1 ]
Guang, Yan [1 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou 450000, Peoples R China
关键词
Protocol reverse engineering; Communication security; Network analysis; Binary analysis; FORMAT EXTRACTION;
D O I
10.1016/j.comcom.2021.11.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread utilization of network protocols raises many security and privacy concerns. To address them, protocol reverse-engineering (PRE) has been broadly applied in diverse domains, such as network management, security validation, and software analysis, by mining protocol specifications. This paper surveys the existing PRE methods and tools, which are based on network trace (NetT) or execution trace (ExeT), according to features representation. The feature-based protocol classification is proposed for the first time in literature to describe and compare different tools more clearly from a new perspective and to inspire crossover approaches in future works. We analyze the rationale, genealogy, contributions, and properties of 74 representative PRE methods/tools developed since 2004. In addition, we extend the general process of the PRE from a feature perspective and provide a detailed evaluation of the well-known methods/tools. Finally, we highlight the open issues and future research directions.
引用
收藏
页码:238 / 254
页数:17
相关论文
共 105 条
[1]  
Anastasis K., 2019, ICSREF FRAMEWORK AUT, DOI [10.14722/ndss.2019.23271, DOI 10.14722/NDSS.2019.23271]
[2]  
[Anonymous], 2006, PEPM
[3]  
[Anonymous], 2012, Technical Report TR-IMDEA-SW-2012-001
[4]  
[Anonymous], Tcpdump-powerful command-line packet analyzer
[5]  
[Anonymous], 2018, Cisco 2018 Annual Cybersecurity Report
[6]  
[Anonymous], SCAPY IS POWERFUL IN
[7]  
[Anonymous], NETWORK MONITOR 34 I
[8]  
[Anonymous], WIRESHARK WORDS MOST
[9]  
Antunes J., 2011, 2011 18th Working Conference on Reverse Engineering, P169, DOI 10.1109/WCRE.2011.28
[10]  
Antunes J., 2009, Building an automaton towards reverse protocol engineering