{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T04:02:23Z","timestamp":1747368143858,"version":"3.40.5"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031928857","type":"print"},{"value":"9783031928864","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-92886-4_17","type":"book-chapter","created":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T06:13:17Z","timestamp":1747289597000},"page":"249-262","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Flatdc: Automatic Schema Reverse Engineering of\u00a0FlatBuffers"],"prefix":"10.1007","author":[{"given":"August","family":"See","sequence":"first","affiliation":[]},{"given":"Benedikt","family":"Ostendorf","sequence":"additional","affiliation":[]},{"given":"Lilly","family":"Sell","sequence":"additional","affiliation":[]},{"given":"Mathias","family":"Fischer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,16]]},"reference":[{"key":"17_CR1","unstructured":"Android bluetooth flatbuffer usage. https:\/\/cs.android.com\/android\/platform\/superproject\/+\/master:packages\/modules\/Bluetooth\/system\/"},{"key":"17_CR2","unstructured":"Flatbuffers: Flatbuffers (2015). https:\/\/flatbuffers.dev\/"},{"key":"17_CR3","unstructured":"Cpprob flatbuffer usage (2017). https:\/\/github.com\/lezcano\/CPProb\/blob\/d77517c250aa79de9888adf4c8e9620f1d5d76ce\/flatbuffers\/infcomp.fbs#L4"},{"key":"17_CR4","unstructured":"Pytorch flatbuffer usage (2024). https:\/\/github.com\/pytorch\/pytorch\/blob\/577f87bbff2ecc9f5c5930ac04cf3c5bcada47c5\/torch\/csrc\/jit\/serialization\/mobile_bytecode.fbs"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Andriesse, D., Rossow, C., Stone-Gross, B., Plohmann, D., Bos, H.: Highly resilient peer-to-peer botnets are here: an analysis of gameover zeus. In: 2013 8th International Conference on Malicious and Unwanted Software: \u201cThe Americas\u201d (MALWARE), pp. 116\u2013123. IEEE (2013)","DOI":"10.1109\/MALWARE.2013.6703693"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Bossert, G., Guih\u00e9ry, F., Hiet, G.: Towards automated protocol reverse engineering using semantic information. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pp. 51\u201362 (2014)","DOI":"10.1145\/2590296.2590346"},{"key":"17_CR7","unstructured":"Egele, M., Woo, M., Chapman, P., Brumley, D.: Blanket execution: dynamic similarity testing for program binaries and components. In: 23rd $$\\{$$USENIX$$\\}$$ Security Symposium ($$\\{$$USENIX$$\\}$$ Security 2014), pp. 303\u2013317 (2014)"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Haas, S., Karuppayah, S., Manickam, S., M\u00fchlh\u00e4user, M., Fischer, M.: On the resilience of P2P-based botnet graphs. In: 2016 IEEE Conference on Communications and Network Security (CNS), pp. 225\u2013233. IEEE (2016)","DOI":"10.1109\/CNS.2016.7860489"},{"key":"17_CR9","unstructured":"Kwsch, K.: FlatCrawler: Data crawling utility tool & library to reverse engineer FlatBuffer binaries (2021). https:\/\/github.com\/kwsch\/FlatCrawler"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Lee, C., Bae, J., Lee, H.: PRETT: protocol reverse engineering using binary tokens and network traces. In: ICT Systems Security and Privacy Protection: 33rd IFIP TC 11 International Conference, pp. 141\u2013155. Springer (2018)","DOI":"10.1007\/978-3-319-99828-2_11"},{"key":"17_CR11","unstructured":"Mendez, A.: Protobuf-inspector (2016). https:\/\/github.com\/mildsunrise\/protobuf-inspector"},{"issue":"3","key":"17_CR12","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1016\/0022-2836(70)90057-4","volume":"48","author":"SB Needleman","year":"1970","unstructured":"Needleman, S.B., Wunsch, C.D.: A general method applicable to the search for similarities in the amino acid sequence of two proteins. J. Mol. Biol. 48(3), 443\u2013453 (1970)","journal-title":"J. Mol. Biol."},{"key":"17_CR13","unstructured":"Paetzelt, A.: Pre-list (2020). https:\/\/github.com\/techge\/PRE-list"},{"issue":"1","key":"17_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2522968.2522972","volume":"46","author":"KA Roundy","year":"2013","unstructured":"Roundy, K.A., Miller, B.P.: Binary-code obfuscations in prevalent packer tools. ACM Comput. Surv. (CSUR) 46(1), 1\u201332 (2013)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"See, A., Fritz, L., Fischer, M.: Polymorphic protocols at the example of mitigating web bots. In: European Symposium on Research in Computer Security, pp. 106\u2013124. Springer (2022)","DOI":"10.1007\/978-3-031-17143-7_6"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"See, R.A., R\u00f6bert, K., Fischer, M.: Encrypted endpoints: defending online services from illegitimate bot automation. In: Proceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses, pp. 166\u2013180 (2024)","DOI":"10.1145\/3678890.3678918"},{"key":"17_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/8370341","volume":"2018","author":"BD Sija","year":"2018","unstructured":"Sija, B.D., Goo, Y.H., Shim, K.S., Hasanova, H., Kim, M.S.: A survey of automatic protocol reverse engineering approaches, methods, and tools on the inputs and outputs view. Secur. Commun. Netw. 2018, 1\u201317 (2018)","journal-title":"Secur. Commun. Netw."},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Wang, Y., et al.: A semantics aware approach to automated reverse engineering unknown protocols. In: 2012 20th IEEE ICNP, pp. 1\u201310. IEEE (2012)","DOI":"10.1109\/ICNP.2012.6459963"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-92886-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T06:13:22Z","timestamp":1747289602000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-92886-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031928857","9783031928864"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-92886-4_17","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"16 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Maribor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 May 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"40","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sec2025.um.si\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}