[1] 吴礼发,洪征,潘璠.网络协议逆向分析及应用[M].北京:国防工业出版社,2016. [2] 吴礼发,王辰,洪征,等.协议状态机推断技术研究进展[J].计算机应用研究,2015,32(7):1931-1936. [3] 王军.基于EDSM的二进制协议状态机逆向[D].哈尔滨:哈尔滨工业大学,2016. [4] TRIFILO A,BURSCHKA S,BIERSACK E.Traffic to protocol reverse engineering[C]//Proceedings of IEEE International Conference on Computational Intelligence for Security and Defense Applications.Washington D.C.,USA:IEEE Press,2009:1-8. [5] SHEVERTALOV M,MANCORIDIS S.A reverse engi-neering tool for extracting protocols of networked applications[C]//Proceedings of the 14th Working Conference on Reverse Engineering.Washington D.C.,USA:IEEE Press,2007:229-238. [6] WANG Yipeng,ZHANG Zhibin,YAO Danfeng,et al.Inferring protocol state machine from network traces:a probabilistic approach[C]//Proceedings of International Conference on Applied Cryptography and Network Security.Berlin,Germany:Springer,2011:1-18. [7] DUNN J C.Well-separated clusters and optimal fuzzy partitions[J].Journal of Cybernetics,1974,4(1):95-104. [8] JACCARD P.The distribution of the flora in the alpine zone[J].New Phytologist,1912,11(2):37-50. [9] KAUFMAN L,ROUSSEEUW P J.Finding groups in data:an introduction to cluster analysis[M].Washington D.C.,USA:John Wiley and Sons,Inc.,2009. [10] 黄笑言,陈性元,祝宁,等.基于状态标注的协议状态机逆向方法[J].计算机应用,2013,33(12):3486-3489. [11] XIAO Mingming,YU Shunzheng,WANG Yu.Automatic network protocol automaton extraction[C]//Proceedings of the 3rd International Conference on Network and System Security.Washington D.C.,USA:IEEE Press,2009:336-343. [12] 肖明明,余顺争.基于文法推断的协议逆向工程[J].计算机研究与发展,2013,50(10):2044-2058. [13] TAO Siyu,YU Hongyi,LI Qing.Bit-oriented format extraction approach for automatic binary protocol reverse engineering[J].IET Communications,2016,10(6):709-716. [14] COMPARETTI P M,WONDRACEK G,KRUEGEL C,et al.Prospex:protocol specification extraction[C]//Proceedings of IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2009:110-125. [15] 张黎.基于Net-trace的网络协议逆向工程方法研究[D].武汉:华中科技大学,2011. [16] 肖明明,余顺争,张世龙.文法推断网络协议状态机[J].科学技术与工程,2014,14(19):100-105. |