[1] |
SIJA B D , GOO Y H , KYU S S ,et al. Survey on network protocol reverse engineering approaches,methods and tools[C]// IEEE Network Operations and Management Symposium. 2017: 271-274.
|
[2] |
PAN D , WANG Y , XUE Z . Remote control trojan vulnerability mining based on reverse analysis of network protocol[J]. Computer Engineering, 2016: 124-140
|
[3] |
WEN S , MENG Q , FENG C ,et al. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering[J]. Plos One, 2017,12(10): 186-188.
|
[4] |
LI W , AI M , JIN B . A network protocol reverse engineering method based on dynamic taint propagation similarity[M]. Intelligent Computing Theories and Application. Springer International Publishing, 2016: 580-592.
|
[5] |
WEI X , LIU R , XU F . Reverse analysis of industrial control protocol based on static binary analysis[J]. Application of Electronic Technique, 2018: 366-372.
|
[6] |
BLUMBERGS B , VAARANDI R . BBUZZ:a bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis[C]// IEEE Military Communications Conference. 2017: 707-712.
|
[7] |
SIJA B D , GOO Y H , SHIM K S ,et al. Protocol reverse engineering methods for undocumented ethernet and wireless protocols;survey[C]// Symposium of the Korean Institute of Communications and Information Sciences. 2017: 281-312.
|
[8] |
GOO Y H , SHIM K S , CHAE B M ,et al. Framework for precise protocol reverse engineering based on network traces[C]// IEEE/IFIP Network Operations and Management Symposium. 2018: 1-4.
|
[9] |
BARMPATSALON K , DAMOPOULOS D , KAMBOURAKIS G ,et al. A critical review of 7 years of mobile device forensics[J]. Digital Investigation, 2015,(10): 323-349.
|
[10] |
DU J . Android mobile forensics privilege promotion[J]. Silicon Valley, 2016,14: 563-578.
|
[11] |
AL BARGHOUTHY N , MARRINGTON A . A comparison of forensic acquisition techniques for android devices:a case study investigation of or Web browsing sessions[C]// 2014 6th International Conference on New Technologies Mobility and Security (NTMS). 2014: 1-4.
|
[12] |
JONKERS K . The forensic use of mobile phone flasher boxes[J]. Digital Investigation, 2015,(6): 168-178.
|
[13] |
JEON S , BANG J , BYUN K ,et al. A recovery method of deleted record for SQLite database[J]. Personal and Ubiquitous Computing, 2017,16(6): 707-715.
|
[14] |
YANG Y T , ZU Z Y , SUN G Z . Historical data recovery from android devices[M]// Future Information Technology. Berlin Heidelberg:Springer, 2016: 251-257.
|
[15] |
GROBLER C , LOUWRENS C , VON SOLMS S . A multi-component view of digital forensics:fifth international conference on availability,reliability,and security[C]// IEEE Piscataway. 2011: 647-652.
|
[16] |
THING V L L , NG K Y , CHANG E C . Live memory forensics of mobile phones[J]. Digital Investigation, 2015: 74-82.
|