Archive - Central European Conference on Information and Intelligent Systems, CECIIS - 2008

Font Size: 
Reverse engineering unknown protocols
Tonimir KiA!asondi, A1eljko Hutinski, Vesna DuA!ak

Last modified: 2008-08-25

Abstract


In this work we will present our method for analyzing and reverse engineering unknown or proprietary protocols for the purpose of analyzing the protocol security or gaining more insight into the protocols inner operation. We created a method that can be executed manually or can be packed into a fully automatic algorithm.

Full Text: PDF