Recovery of binary data structures from program traces
Abstract
About the Authors
A. I. AvetisyanRussian Federation
A. I. Getman
Russian Federation
References
1. Lim J., Reps T., Liblit B. Extracting Output Formats from Executables. Proceedings of the 13th Working Conference on Reverse Engineering, 2006. рр. 167—178.
2. Caballero J., Yin H., Liang Z., Song D. Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis. Proceedings of the 14th ACM Conference on Computer and and Communications Security, 2007. pp. 317—329.
3. Lin Z., Jiang X., Xu D., Zhang X. Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. Proceedings of the 15th Symposium on Network and Distributed System Security, 2008.
4. Wondracek G., Kruegel C., Kirda E., Milani P. Automatic Network Protocol Analysis. Proceedings of the 15th Symposium on Network and Distributed System Security, 2008.
5. Cui W. , Peinado M., Chen K., Wang H. J., Irun-Briz L. Tupni: Automatic Reverse Engineering of Input Formats. Proceedings of the 15th ACM conference on Computer and communications security, 2008. pp. 391—402.
6. Cui W., Kannan J., Wang H. J. Discoverer: Automatic Protocol Reverse Engineering from Network Traces. Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, 2007. pp. 14:1—14:14
Review
For citations:
Avetisyan A.I., Getman A.I. Recovery of binary data structures from program traces. Proceedings of the Institute for System Programming of the RAS (Proceedings of ISP RAS). 2012;22. (In Russ.)