Protocol reverse engineering: Challenges and obfuscation

1Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Reverse engineering of communication protocols is aimed at providing methods and tools allowing to infer a model of these protocols. It is very relevant for many application domains, such as interoperability or security audits. Recently, several tools have been developed in order to automate, entirely or partially, the protocol inference process. These tools rely on several techniques, that are usually tuned and adapted according to the final goal of the reverse engineering task. The aim of this paper is (1) to present an overview of the main challenges related to reverse engineering, and (2) to introduce the use of obfuscation techniques to make the reverse engineering process more complex and difficult in particular to malicious users.

Cite

CITATION STYLE

APA

Duchêne, J., Le Guernic, C., Alata, E., Nicomette, V., & Kaâniche, M. (2017). Protocol reverse engineering: Challenges and obfuscation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10158 LNCS, pp. 139–144). Springer Verlag. https://doi.org/10.1007/978-3-319-54876-0_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free