Protocol State Machine Reverse Engineering with a Teaching-Learning Approach

نویسندگان

چکیده

In this work, we propose a novel solution to the problem of inferring state machine an unknown protocol. We extend and improve prior results on Mealy machines, present new algorithm that accesses interacts with networked system runs protocol in order infer representing protocol's machine. To demonstrate viability our approach, provide implementation illustrate operation simple example protocol, as well two real-world protocols, Modbus MQTT.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Machine teaching: a machine learning approach to technology enhanced learning

Many applications of Technology Enhanced Learning are based on strong assumptions: Knowledge needs to be standardized, structured and most of all externalized into learning material that preferably is annotated with meta-data for efficient re-use. A vast body of valuable knowledge does not meet these assumptions, including informal knowledge such as experience and intuition that is key to many ...

متن کامل

A Highly Immersive Approach to Teaching Reverse Engineering

While short training courses in reverse engineering are frequently offered at meetings like Blackhat and through training organizations such as SANS, there are virtually no reverse engineering courses offered in academia. This paper discusses possible reasons for this situation, emphasizes the importance of teaching reverse engineering (and applied computer security education in general), and p...

متن کامل

Reverse Engineering Integrated Circuits Using Finite State Machine Analysis

Due to the lack of a secure supply chain, it is not possible to fully trust the integrity of electronic devices. Current methods of verifying integrated circuits are either destructive or non-specific. Here we expand upon prior work, in which we proposed a novel method of reverse engineering the finite state machines that integrated circuits are built upon in a non-destructive and highly specif...

متن کامل

A Reverse Engineering Approach

As Extensible Markup Language (XML) (Bray, 2004) has become the standard document format, the chance that users have to deal with XML documents with different structures is increasing. If the schema of the XML documents in Document Type Definition (DTD) (Bosak, 1998) is given or derived from the XML documents right away (Kay, 1999; Moh, 2000), it is easier to study the contents of the XML docum...

متن کامل

A Tool for Teaching Reverse Engineering

Tigress is a freely available source-to-source, C language code obfuscator. The tool allows users to obfuscate existing programs or programs randomly generated by Tigress itself. Tigress is highly flexible, providing a large number of standard obfuscating code transformations, and many variants of each transformation. Tigress may be used in many contexts, but in this paper we describe its use i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Acta Cybernetica

سال: 2021

ISSN: ['2676-993X', '0324-721X']

DOI: https://doi.org/10.14232/actacyb.288213