Computer Science ›› 2015, Vol. 42 ›› Issue (12): 233-239.
Previous Articles Next Articles
WANG Chen, WU Li-fa, HONG Zheng, ZHENG Cheng-hui and ZHUANG Hong-lin
[1] 李伟明,张爱芳,刘建财,等.网络协议的自动化模糊测试漏洞挖掘方法[J].计算机学报,2011,34(2):242-255 Li W M,Zhang A F,Liu J C,et al.An Automatic Network Protocol Fuzz Testing and Vulnerability Discovering Method [J].Chinese Journal of Computers,2011,34(2):242-255 [2] 侯莹,洪征,潘璠,等.基于模型的Fuzzing测试脚本自动化生成[J].计算机科学,2013,40(3):206-209 Hou Y,Hong Z,Pan F,et al.Model Based Automatic Fuzzing Script Generation [J].Computer Science,2013,38(3):206-209 [3] 应凌云,杨轶,冯登国,等.恶意软件网络协议的语法和行为语义分析方法[J].软件学报,2011,22(7):1676-1689 Ying L Y,Yang Y,Feng D G,el al.Syntax and Behavior Semantics Analysis of Network Protocol of Malware[J].Journal of Software,2011,22(7):1676-1689 [4] Tridgell.How Samba was written [EB/OL].2005-02-04[2014-11-10].http://samba.org/ftp/tridge/misc/french_cafe.txt [5] Lang K J.Faster Algorithms for Finding Minimal ConsistentDFAs[R].NEC Research Institute,1999 [6] Oncina J,Garcia P.Inferring regular languages in polynomial update time [J].Pattern Recognition and Image Analysis,1992,1:49-61 [7] Lang K J,Pearlmutter B A,Price R A.Results of the Abbadingo one DFA learning competition and a new evidence-driven state merging algorithm[M]∥Grammatical Inference.Springer Berlin Heidelberg,1998:1-12 [8] Gold E M.Language Identification in the Limit [J].Information and Control,1967,10(5):447-474 [9] Dupont P,Lambeau B,Damas C,et al.The QSM algorithm and its application to software behavior model induction [J].Applied Artificial Intelligence,2008,22(1):77-115 [10] Angluin D.Learning regular sets from queries and counterexamples [J].Information and computation,1987,75(2):87-106 [11] Shahbaz M.Reverse Engineering Enhanced State Models ofBlack Box Software Components to Support Integration Testing [D].Laboratoire Informatique de Grenoble,2008 [12] Cho C Y,Shin E C R,Song D.Inference and analysis of formal models of botnet command and control protocols[C]∥Procee-dings of the 17th ACM Conference on Computer and Communications Security.ACM,2010:426-439 [13] Caballero J,Poosankam P,Kreibich C,et al.Dispatcher:Enabling active botnet infiltration using automatic protocol reverse-engineering[C]∥Proceedings of the 16th ACM Conference on Computer and Communications Security.ACM,2009:621-634 [14] Wikipedia Contributors.Mealy machine [EB/OL].2013-11-13[2014-11-10].http://zh.wikipedia.org/wiki/Mealy%E6%9C%BA [15] 肖明明,余顺争.基于文法推断的协议逆向工程[J].计算机研究与发展,2013,50(10):2044-2058 Xiao M M,Yu S Z.Protocol Reverse Engineering Using Grammatical Inference[J].Journal of Computer Research and Deve-lopment,2013,50(10):2044-2058 [16] 潘璠,洪征,杜有翔,等.基于递归聚类的报文结构提取方法[J].四川大学学报(工学版),2012,4(6):137-142 Pan F,Hong Z,Du Y X,et al.Recursive Clustering Based Method for Message Structure Extraction [J].Journal of Sichuan University (Engineering Science Edition),2012,44(6):137-142 [17] Comparetti P M,Wondracek G,Kruegel C,et al.Prospex:Protocol specification extraction[C]∥2009 30th IEEE Symposium on Security and Privacy.IEEE,2009:110-125 [18] Bossert G,Guihéry F.Security Evaluation of CommunicationProtocols in Common Criteria[R].Paris:ICCC,2012 [19] Postel J.RFC821:Simple Mail Transfer Protocol[S].IETF,1982 [20] Myers J,Rose M.RFC1939:Post Office Protocol-Version3[S].IETF,1996 [21] 潘璠,洪征,周振吉,等.语义层次的协议格式提取方法[J].通信学报,2013,34(10):162-173 Pan F,Hong Z,Zhou Z J,et al.Protocol format extraction at semantic level [J].Journal on Communications,2013,34(10):162-173 |
No related articles found! |
|