State of the art of network protocol reverse engineering toolsReport as inadecuate

State of the art of network protocol reverse engineering tools - Download this document for free, or read online. Document in PDF available to download.

1 DGA.MI - DGA Maîtrise de l-information 2 LAAS-TSF - Équipe Tolérance aux fautes et Sûreté de Fonctionnement informatique LAAS - Laboratoire d-analyse et d-architecture des systèmes Toulouse 3 TAMIS - Threat Analysis and Mitigation for Information Security Inria Rennes – Bretagne Atlantique , IRISA D4 - LANGAGE ET GÉNIE LOGICIEL

Abstract : Communication protocols enable structured information exchanges between different entities. A description, at different levels of detail, is necessary for many applications, such as interoperability or security audits. When such a description is not available, one can resort to protocol reverse engineering to infer the format of exchanged messages or a model of the protocol. During the past 12 years, several tools have been developed in order to automate, entirely or partially, the protocol inference process. Each of those tools has been developed with a specific application goal for the inferred model, leading to specific needs, and thus different strengths and limitations. After identifying key challenges, the paper presents a survey of protocol reverse engineering tools developed in the last decade. We consider tools focusing on the inference of the format of individual messages or of the grammar of sequences of messages. Finally, we propose a classification of these tools according to different criteria, that is aimed at providing relevant insights about the techniques used by each of these tools and comparatively to other tools, for the classification of messages, the inference of their format or of the grammar of the protocol. This classification also permits to identify technical areas that are not sufficiently explored so far and that require further development in the future.

Keywords : Binary application analysis Network trace analysis Data structure inference Reverse engineering Protocol inference

Author: Julien Duchêne - Colas Le Guernic - Eric Alata - Vincent Nicomette - Mohamed Kaâniche -



Related documents