Cargando…
Protocol vulnerability detection based on network traffic analysis and binary reverse engineering
Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines networ...
Autores principales: | Wen, Shameng, Meng, Qingkun, Feng, Chao, Tang, Chaojing |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2017
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5648143/ https://www.ncbi.nlm.nih.gov/pubmed/29049409 http://dx.doi.org/10.1371/journal.pone.0186188 |
Ejemplares similares
-
A model-guided symbolic execution approach for network protocol implementations and vulnerability detection
por: Wen, Shameng, et al.
Publicado: (2017) -
Ffuzz: Towards full system high coverage fuzz testing on binary executables
por: Zhang, Bin, et al.
Publicado: (2018) -
Traffic Light Recognition Based on Binary Semantic Segmentation Network
por: Kim, Hyun-Koo, et al.
Publicado: (2019) -
Traffic networks are vulnerable to disinformation attacks
por: Waniek, Marcin, et al.
Publicado: (2021) -
Deep Cost-Sensitive Kernel Machine for Binary Software Vulnerability Detection
por: Nguyen, Tuan, et al.
Publicado: (2020)