[1] |
WANG Y P , ZHANG Z B , YAO D F ,et al. Inferring protocol state machine from network traces:a probabilistic approach[C]// Proceedings of Applied Cryptography and Network Security. 2011: 1-18.
|
[2] |
HSU Y , SHU G Q , LEE D . A model-based approach to security flaw detection of network protocol implementations[C]// Proceedings of 2008 IEEE International Conference on Network Protocols. 2008: 114-123.
|
[3] |
KRUEGER T , GASCON H , KR?MER N ,et al. Learning stateful models for network honeypots[C]// Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence. 2012: 37-48.
|
[4] |
ANGLUIN D . Learning regular sets from queries and counterexamples[J]. Information and Computation, 1987,75(2): 87-106.
|
[5] |
KLEBER S , MAILE L S , KARGL F . Survey of protocol reverse engineering algorithms:decomposition of tools for static traffic analysis[J]. IEEE Communications Surveys & Tutorials, 2019,21(1): 526-561.
|
[6] |
CASSEL S , HOWAR F , JONSSON B ,et al. A succinct canonical register automaton model[J]. Journal of Logical and Algebraic Methods in Programming, 2015,84(1): 54-66.
|
[7] |
SZéKELY G , LáDI G , HOLCZER T ,et al. Protocol state machine reverse engineering with a teaching-learning approach[J]. Acta Cybernetica, 2021,25(2): 517-535.
|
[8] |
SUN F H , WANG S , ZHANG H L . A progressive learning method on unknown protocol behaviors[J]. Journal of Network and Computer Applications, 2022,197:103249.
|
[9] |
LEITA C , MERMOUD K , DACIER M . ScriptGen:an automated script generation tool for Honeyd[C]// Proceedings of 21st Annual Computer Security Applications Conference (ACSAC'05). 2005: 203-214.
|
[10] |
COMPARETTI P M , WONDRACEK G , KRUEGEL C ,et al. Prospex:protocol specification extraction[C]// Proceedings of 2009 30th IEEE Symposium on Security and Privacy. 2009: 110-125.
|
[11] |
KRUEGER T , GASCON H , KR?MER N ,et al. Learning stateful models for network honeypots[C]// Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence. 2012: 37-48.
|
[12] |
LEE C , BAE J , LEE H . PRETT:protocol reverse engineering using binary tokens and network traces[C]// Proceedings of ICT Systems Security and Privacy Protection. 2018: 141-155.
|
[13] |
LIN Y D , LAI Y K , BUI Q T ,et al. ReFSM:Reverse engineering from protocol packet traces to test generation by extended finite state machines[J]. Journal of Network and Computer Applications, 2020,171:102819.
|
[14] |
GOLD E M . Language identification in the limit[J]. Information and Control, 1967,10(5): 447-474.
|
[15] |
CHO C Y , ? D B , SHIN E C R ,et al. Inference and analysis of formal models of botnet command and control protocols[C]// Proceedings of the 17th ACM Conference on Computer and Communications Security. 2010: 426-439.
|
[16] |
AARTS F D . Tomte:bridging the gap between active learning and real-world systems[J]. Model Based System Development, 2014.
|
[17] |
RUITER J , POLL E . Protocol state fuzzing of TLS implementations[C]// Proceedings of 24th USENIX Security Symposium. 2015: 193-206.
|
[18] |
申莹珠, 顾纯祥, 陈熹 ,等. 基于模型学习的 OpenVPN 系统脆弱性分析[J]. 软件学报, 2019,30(12): 3750-3764.
|
|
SHEN Y Z , GU C X , CHEN X ,et al. Vulnerability analysis of OpenVPN system based on model learning[J]. Journal of Software, 2019,30(12): 3750-3764.
|
[19] |
FITERAU-BROSTEAN P , JONSSON B , MERGET R ,et al. Analysis of DTLS implementations using protocol state fuzzing[C]// Proceedings of 29th USENIX Security Symposium. 2020: 2523-2540.
|
[20] |
RAFFELT H , STEFFEN B , BERG T . LearnLib:a library for automata learning and experimentation[C]// Proceedings of the 10th International Workshop on Formal Methods for Industrial Critical Systems. 2005: 62-71.
|
[21] |
FITERAU-BROSTEAN P , JANSSEN R , VAANDRAGER F . Combining model learning and model checking to analyze TCP implementations[C]// Proceedings of Computer Aided Verification. 2016: 454-471.
|
[22] |
FITERAU-BROSTEAN P , HOWAR F . Learning-based testing the sliding window behavior of TCP implementations[C]// Proceedings of Critical Systems:Formal Methods and Automated Verification. 2017: 185-200.
|
[23] |
GUO J X , GU C X , CHEN X ,et al. Model learning and model checking of IPSec implementations for internet of things[J]. IEEE Access, 2019,7: 171322-171332.
|
[24] |
王辰, 吴礼发, 洪征 ,等. 一种基于域知识的协议状态机主动推断算法[J]. 计算机科学, 2015,42(12): 233-239.
|
|
WANG C , WU L F , HONG Z ,et al. Domain-specific algorithm of protocol state machine active inference[J]. Computer Science, 2015,42(12): 233-239.
|
[25] |
ISBERNER M . Foundations of active automata learning:an algorithmic perspective[D]. Technische Universit?t Dortmund,Dortmund, 2015.
|
[26] |
CENGIZ TüRKER U , HIERONS R M , JOURDAN G V . Minimizing characterizing sets[J]. Science of Computer Programming, 2021,208:102645.
|
[27] |
HOWAR F , STEFFEN B , JONSSON B ,et al. Inferring canonical register automata[C]// Proceedings of International Workshop on Verification,Model Checking,and Abstract Interpretation. 2012: 251-266.
|
[28] |
FANG D L , SONG Z W , GUAN L ,et al. ICS3Fuzzer:a framework for discovering protocol implementation bugs in ICS supervisory software by fuzzing[C]// Proceedings of ACSAC:Annual Computer Security Applications Conference. 2021: 849-860.
|
[29] |
YANG N , ASLAM K , SCHIFFELERS R ,et al. Improving model inference in industry by combining active and passive learning[C]// Proceedings of 2019 IEEE 26th International Conference on Software Analysis,Evolution and Reengineering. 2019: 253-263.
|