首页> 外文会议>Network and Distributed System Security Symposium >Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
【24h】

Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution

机译:自动协议格式通过上下文感知监视执行反向工程

获取原文

摘要

Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have recently been proposed to allow for automatic protocol reverse engineering. Unfortunately, they are either limited in extracting protocol fields due to lack of program semantics in network traces or primitive in only revealing the flat structure of protocol format. In this paper, we present a system called AutoFormat that aims at not only extracting protocol fields with high accuracy, but also revealing the inherently "non-flat", hierarchical structures of protocol messages. AutoFormat is based on the key insight that different protocol fields in the same message are typically handled in different execution contexts (e.g., the runtime call stack). As such, by monitoring the program execution, we can collect the execution context information for every message byte (annotated with its offset in the entire message) and cluster them to derive the protocol format. We have evaluated our system with more than 30 protocol messages from seven protocols, including two text-based protocols (HTTP and SIP), three binary-based protocols (DHCP, RIP, and OSPF), one hybrid protocol (CIFS/SMB), as well as one unknown protocol used by a real-world malware. Our results show that AutoFormat can not only identify individual message fields automatically and with high accuracy (an average 93.4percent match ratio compared with Wireshark), but also unveil the structure of the protocol format by revealing possible relations (e.g., sequential, parallel, and hierarchical) among the message fields.
机译:协议逆向工程常常是被认为是耗时的手动过程,繁琐且容易出错。为了解决这一限制,一些解决方案最近已经提出了允许自动协议逆向工程。不幸的是,它们或者在提取协议字段有限的,由于在网络跟踪缺乏程序语义的或仅揭示协议格式的扁平结构基元。在本文中,我们提出了一种称为套用系统,其目的在于不仅取出高精度协议领域,还揭示协议消息的固有“非平坦”的分层结构。自动格式化的基于密钥认识,即在同一消息中不同的协议字段在不同的执行上下文(例如,运行时调用栈)典型地处理。这样,通过监视程序的执行,我们可以收集每个消息字节的执行上下文信息(连同其整个消息中的偏移注释)和群集它们来导出协议格式。我们评价我们的系统具有多于30个协议消息来自七个协议,包括两个基于文本的协议(HTTP和SIP),三个基于二进制的协议(DHCP,RIP和OSPF),一个混合协议(CIFS / SMB),以及一个由现实世界中的恶意软件使用未知协议。我们的研究结果表明,套用不仅可以自动地并以高精确度(平均93.4percent匹配比使用Wireshark相比)识别各个消息字段,而且还通过揭示可能存在的关系(例如,顺序的,平行的,并且揭开协议格式的结构分级)的消息字段中。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号