[1] |
CUI B , WANG F , HAO Y ,et al. A taint based approach for automatic reverse engineering of gray-box file formats[J]. Soft Computing, 2015: 1-16.
|
[2] |
BOSSERT G , GUIHéRY F , HIET G . Towards automated protocol reverse engineering using semantic information[C]// Proceedings of the 9th ACM Symposium on Information,Computer and Communications Security. 2014.
|
[3] |
NARAYAN J , SHUKLA S K , CLANCY T C . A survey of automatic protocol reverse engineering tools[J]. ACM Comput Surv, 2015,48: 1-26.
|
[4] |
LI X D , . A survey on methods of automatic protocol reverse engineering[C]// Proceedings of the 2011 Seventh International Conference on Computational Intelligence and Security. 2011: 685-689.
|
[5] |
CABALLERO D S J . Automatic protocol reverse-engineering:message format extraction and field semantics inference[J]. Computer Networks, 2012,54(2): 451-474.
|
[6] |
JO?O A N N , . Automatically complementing protocol specifications from network traces[C]// European Workshop on Dependable Computer, 2011: 87-92.
|
[7] |
MENG F Z , LIU Y , ZHANG C R ,et al. Inferring protocol state machine for binary communication protocol[C]// Advanced Research and Technology in Industry Applications (WARTIA). 2014: 870-874.
|
[8] |
HAN K , LIM J H , IM E G . Malware analysis method using visualization of binary files[C]// Proceedings of the 2013 Research in Adaptive and Convergent Systems,Montreal,Quebec,Canada, 2013.
|
[9] |
苏璞睿, 杨轶 . 基于可执行文件静态分析的入侵检测模型[J]. 计算机学报, 2006,29: 1572-1578.
|
|
SU P R , YANG Y . Intrusion detection model based on executable static analysis[J]. Chinese Journal of Computers, 2006,29: 1572-1578.
|
[10] |
胡燕京, 裴庆祺, 庞辽军 . 消息和指令分析相结合的网络协议异常行为分析[J]. 通信学报, 2015,36(11): 147-155.
|
|
HU Y J , PEI Q Q , PANG L J . Message combined with instruction analysis for network protocol’s abnormal behavior[J]. Journal on Communications, 2015,36(11): 147-155.
|
[11] |
LIN W , ZHU Y F , SHI X L . A method of multiple encryption and sectional encryption protocol reverse engineering[C]// 2014 Tenth International Conference on Computational Intelligence and Security (CIS). 2014: 420-424.
|
[12] |
RAHIMIAN A , ZIARATI R , PREDA S ,et al. On the reverse engineering of the citadel botnet[J]. Foundations and Practice of Security, 2014: 408-425.
|
[13] |
COMPARETTI P M , SALVANESCHI G , KIRDA E ,et al. Identifying dormant functionality in malware programs[C]// IEEE Symposium on Security &Privacy, 2010: 61-76.
|
[14] |
KANG B , KIM T , KWON H ,et al. Malware classification method via binary content comparison[C]// ACM Research in Applied Computation Symposium. 2012: 316-321.
|
[15] |
NATANI P , VIDYARTHI D . An overview of detection techniques for metamorphic malware[J]. Intelligent Computing,Networking,and Informatics, 2014: 637-643.
|