Hu, Yanjing; Pei, Qingqi - In: International Journal of Business Data Communications … 13 (2017) 2, pp. 1-14
Unknown protocol's hidden behavior is becoming a new challenge in network security. This paper takes the captured messages and the binary code that implement the protocol both as the studied object. Dynamic Taint Analysis combined with Static Analysis is used for protocol analyzing. Firstly,...