[1] |
CUI W , KANNAN J , WANG H . Discoverer:automatic protoco re-verse engineering from network traces[A]. The 16th USENIX Security Symposium[C]. Boston,Sheraton,USA, 2007. 199-212.
|
[2] |
李伟明, 张爱芳, 刘建财 ,et al. 基于支持向量机的Internet流量分类研究[J]. 计算机研究与发展, 2009,46(3): 407-414. LI W M , ZHANG A F , LIU J C ,et al. An automatic network protocol fuzz testing and vulnerability discovering method[J]. Chinese Journal of Computers, 2011,34(2): 242-255.
|
[3] |
CABALLERO J , YIN H , LIANG Z ,et al. Polyglot:automatic extrac-tion of protocol format using dynamic binary analysis[A]. ACM CCS[C]. Alexandria,VA,USA, 2007. 317-329.
|
[4] |
CUI W , PEINADO M , CHEN K ,et al. Tupni:automatic reverse engi-neering of input formats[A]. ACM CCS[C]. Alexandria,VA,USA, 2008. 391-402
|
[5] |
CABALLERO J , POOSANKAM P , KREIBICH C ,et al. Dispatcher:enabling active botnet infiltration using automatic protocol Re-verse-engineering[A]. ACM CCS[C]. Chicago,IL,USA, 2009. 621-634.
|
[6] |
COMPARETTI P , WONDRACEK G , KRUEGEL C ,et al. Prospex:protocol specification extraction[A]. IEEE S&P[C]. Oakland,Califor-nia,USA, 2009. 110-125.
|
[7] |
应凌云, 杨轶, 冯登国 ,等. 恶意软件网络协议的语法和行为语义分析方法[J]. 软件学报, 2011,22(7): 1676-1689. YING L Y , YANG Y , FENG D G ,et al. Syntax and behavior semantics analysis of network protocol of malware[J]. Journal of Software, 2011,22(7): 1676-1689.
|
[8] |
WONDRACEK G , COMPARETTI P , KRUEGEL C ,et al. Automatic network protocol analysis[A]. NDSS[C]. San Diego,Cali nia,USA, 2008. 1-14.
|
[9] |
LIN Z , JIANG X , XU D ,et al. Automatic protocol format reverse engineering through context-aware monitored execution[A]. NDSS[C]. San Diego,California,USA, 2008. 29-43.
|
[10] |
GODEFRIOD P , KIEZUN A , LEVIN M , Grammar-based whitebox fuzzing[J]. ACM SIGPLAN Notices, 2008,43(6): 206-215.
|
[11] |
BRUMLEY D , JAGER I , AVGERINOS T ,et al. BAP:a binary analy-sis platform[A]. ACM CAV[C]. Snowbird,Utah,USA, 2011. 463-369.
|
[12] |
NICHOLAS N . Dynamic Binary Analysis and Instrumentation or Building Tools is Easy[D]. University of Cambridge, 2004.
|
[13] |
EDWARD J , AVGERINOS T , BRUMLEY D . All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)[A]. IEEE S&P[C]. Oakland,Cali-fornia,USA, 2010. 317-331.
|
[14] |
王铁磊 . 面向二进制程序的漏洞挖掘关键技术研究[D]. 北京 :北京大学, 2011. WANG T . Research on Binary-Executable-Oriented Software Vulne-rability Detection[D]. Beijing:Peking University, 2011.
|
[15] |
LIN Z , ZHANG X . Deriving input syntactic structure fro execu-tion[A]. ACM SIGSOFT[C]. Atlanta,Georgia,USA, 2008. 83-93.
|
[16] |
YIN H , SONG D . binary code analysis via whole-system layered annotative execution[EB/OL]. , 2010.
|
[17] |
A BDD package[EB/OL]. .
|
[18] |
刘豫, 聂眉宁, 苏璞睿 ,等. 基于可回溯动态污点分析的攻击特征生成方法[J]. 通信学报, 2012,33(5): 21-28. LIU Y , NIE M Y , SU P R ,et al. Attack signature generation by tracea-ble dynamic taint analysis[J]. Journal on Communications, 2012,33(5): 21-28.
|
[19] |
陈恺, 冯登国, 苏璞睿 ,等. 基于彩色污点传播的黑盒测试方法[J]. 中国科学 :信息科学, 2011,41(5): 526-540 CHEN K , FENG D G , SU P R ,et al. Black-box testing based on co-lorful taint analysis[J]. Science China Information Science, 2011,41(5): 526-540.
|
[20] |
SLOWINSKA A , BOS H . Pointless tainting?:evaluating the practical-ity of pointer tainting[A]. ACM European Conference on Computer Systems[C]. Nuremberg,Germany, 2009. 61-74.
|
[21] |
KAND M , MCCAMANT S , POOSANKAM P ,et al. DTA++:dynamic taint analysis with targeted control-flow propagation[A]. NDSS[C]. San Diego,California,USA, 2011. 26-39.
|
[22] |
WANG Z , JIANG X , CUI W ,et al. ReFormat:automatic reverse engineering of encrypted messages[A]. CESORICS[C]. Athens,Greece, 2010. 200-215.
|
[23] |
CHO C , DOMAGOJ B , SHIN E ,et al. Inference and analysis of for-mal models of botnet command and control protocols[A]. ACM CCS[C]. Chicago,Illinois,USA, 2010. 426-439
|