{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T07:58:41Z","timestamp":1769759921214,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642044434","type":"print"},{"value":"9783642044441","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04444-1_13","type":"book-chapter","created":{"date-parts":[[2009,9,14]],"date-time":"2009-09-14T14:34:44Z","timestamp":1252938884000},"page":"200-215","source":"Crossref","is-referenced-by-count":62,"title":["ReFormat: Automatic Reverse Engineering of Encrypted Messages"],"prefix":"10.1007","author":[{"given":"Zhi","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xuxian","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Weidong","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Xinyuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Mike","family":"Grace","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"23-24","key":"13_CR1","doi-asserted-by":"publisher","first-page":"2345","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V. Paxson","year":"1999","unstructured":"Paxson, V.: Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks\u00a031(23-24), 2345\u20132463 (1999)","journal-title":"Computer Networks"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Wang, H.J., Guo, C., Simon, D.R., Zugenmaier, A.: Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits. In: Proceedings of ACM SIGCOMM 2004, pp. 193\u2013204 (2004)","DOI":"10.1145\/1015467.1015489"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Cui, W., Peinado, M., Wang, H.J., Locasto, M.: Shieldgen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing. In: Proceedings of 2007 IEEE Symposium on Security and Privacy, Oakland, CA (May 2007)","DOI":"10.1109\/SP.2007.34"},{"key":"13_CR4","unstructured":"The Protocol Informatics Project, \n                    \n                      http:\/\/www.baselineresearch.net\/PI\/"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Caballero, J., Song, D.: Polyglot: Automatic Extraction of Protocol Format using Dynamic Binary Analysis. In: Proceedings of the 14th ACM Conference on Computer and and Communications Security, CCS 2007 (2007)","DOI":"10.1145\/1315245.1315286"},{"key":"13_CR6","unstructured":"Cui, W., Kannan, J., Wang, H.J.: Discoverer: Automatic Protocol Reverse Engineering from Network Traces. In: Proceedings of the 16th USENIX Security Symposium (Security 2007), Boston, MA (August 2007)"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Cui, W., Peinado, M., Chen, K., Wang, H.J., Irun-Briz, L.: Tupni: Automatic Reverse Engineering of Input Formats. In: Proceedings of the 15th ACM Conferences on Computer and Communication Security, CCS 2008 (October 2008)","DOI":"10.1145\/1455770.1455820"},{"key":"13_CR8","unstructured":"Lin, Z., Jiang, X., Xu, D., Zhang, X.: Automatic Protocol Format Reverse Engineering Through Context-Aware Monitored Execution. In: Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS 2008) (February 2008)"},{"key":"13_CR9","unstructured":"Wondracek, G., Comparetti, P.M., Kruegel, C., Kirda, E.: Automatic Network Protocol Analysis. In: Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS 2008) (February 2008)"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Comparetti, P.M., Wondracek, G., Kruegel, C., Kirda, E.: Prospex: Protocol Specification Extraction. In: Proceedings of 2009 IEEE Symposium on Security and Privacy, Oakland, CA (May 2009)","DOI":"10.1109\/SP.2009.14"},{"key":"13_CR11","unstructured":"Chow, J., Pfaff, B., Christopher, K., Rosenblum, M.: Understanding Data Lifetime via Whole-System Simulation. In: Proceedings of the 13th USENIX Security Symposium, San Diego, CA (2004)"},{"key":"13_CR12","unstructured":"Newsome, J., Song, D.: Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In: Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS 2005), San Diego, CA (February 2005)"},{"key":"13_CR13","unstructured":"SHTTP: An Embeddable Web Server, \n                    \n                      http:\/\/shttpd.sourceforge.net\/"},{"key":"13_CR14","unstructured":"Know your Enemy: Tracking Botnets - Bot-Commands, \n                    \n                      http:\/\/www.honeynet.org\/papers\/bots\/botnet-commands.html"},{"key":"13_CR15","unstructured":"Wang, Z., Jiang, X., Cui, W., Wang, X.: Reformat: Automatic Reverse Engineering of Encrypted Messages (Department of Computer Science Technical Report, North Carolina State University, TR-2008-26) (2008)"},{"key":"13_CR16","unstructured":"Ircd-hybrid \u2013 High Performance Internet Relay Chat, \n                    \n                      http:\/\/ircd-hybrid.com\/"},{"key":"13_CR17","unstructured":"Cui, W., Paxson, V., Weaver, N., Katz, R.H.: Protocol-Independent Adaptive Replay of Application Dialog. In: Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS 2006), San Diego, CA (February 2006)"},{"key":"13_CR18","series-title":"Lecture Notes in Computer Science","first-page":"203","volume-title":"Advances in Computer Systems Architecture","author":"C. Leita","year":"2005","unstructured":"Leita, C., Mermoud, K., Dacier, M.: ScriptGen: An Automated Script Generation Tool for Honeyd. In: Srikanthan, T., Xue, J., Chang, C.-H. (eds.) ACSAC 2005. LNCS, vol.\u00a03740, pp. 203\u2013214. Springer, Heidelberg (2005)"},{"key":"13_CR19","unstructured":"Chow, J., Pfaff, B., Garfinkel, T., Rosenblum, M.: Shredding Your Garbage: Reducing Data Lifetime through Secure Deallocation. In: Proceedings of the 14th USENIX Security Symposium, Baltimore, Maryland (2005)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2009"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04444-1_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:17:46Z","timestamp":1559506666000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04444-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044434","9783642044441"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04444-1_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}