{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:56:42Z","timestamp":1742961402320,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":31,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819750276"},{"type":"electronic","value":"9789819750283"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5028-3_18","type":"book-chapter","created":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T16:02:12Z","timestamp":1721059332000},"page":"350-369","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ProfistMAC: A Protocol Finite State Machine Classifier via\u00a0Graph Representation"],"prefix":"10.1007","author":[{"given":"Yali","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Yichao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Guang","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,16]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Bossert, G., Guih\u00e9ry, F., Hiet, G.: Towards automated protocol reverse engineering using semantic information. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (2014). https:\/\/api.semanticscholar.org\/CorpusID:9258200","DOI":"10.1145\/2590296.2590346"},{"key":"18_CR2","unstructured":"de Carvalho\u00a0Bertoli, G., Pereira\u00a0J\u00fanior, L.A., F.A.N.V.O.S.: Probing dataset (version v1.0.0). https:\/\/github.com\/gubertoli\/ProbingDataset, (Accessed: 2019)"},{"key":"18_CR3","unstructured":"Chen, Y., et al.: Devils in the guidance: Predicting logic vulnerabilities in payment syndication services through automated documentation analysis. In: USENIX Security Symposium (2019). https:\/\/api.semanticscholar.org\/CorpusID:199536001"},{"key":"18_CR4","unstructured":"Cho, C.Y., Babic, D., Poosankam, P., Chen, K.Z., Wu, E.X., Song, D.X.: Mace: model-inference-assisted concolic exploration for protocol and vulnerability discovery. In: USENIX Security Symposium (2011). https:\/\/api.semanticscholar.org\/CorpusID:811610"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Comparetti, P.M., Wondracek, G., Kr\u00fcgel, C., Kirda, E.: Prospex: Protocol specification extraction. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 110\u2013125 (2009). https:\/\/api.semanticscholar.org\/CorpusID:1170665","DOI":"10.1109\/SP.2009.14"},{"key":"18_CR6","unstructured":"Cui, W., Kannan, J., Wang, H.J.: Discoverer: automatic protocol reverse engineering from network traces. In: USENIX Security Symposium (2007). https:\/\/api.semanticscholar.org\/CorpusID:3143940"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Daniel, L.A., Poll, E., de\u00a0Ruiter, J.: Inferring openvpn state machines using protocol state fuzzing. In: 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), pp. 11\u201319 (2018). https:\/\/api.semanticscholar.org\/CorpusID:49657551","DOI":"10.1109\/EuroSPW.2018.00009"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Draper-Gil, G., Lashkari, A.H., Mamun, M.S.I., Ghorbani, A.A.: Characterization of encrypted and vpn traffic using time-related features. In: International Conference on Information Systems Security and Privacy (2016). https:\/\/api.semanticscholar.org\/CorpusID:21535780","DOI":"10.5220\/0005740704070414"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Duch\u00eane, J., Guernic, C.L., Alata, E., Nicomette, V., Ka\u00e2niche, M.: State of the art of network protocol reverse engineering tools. J. Comput. Virology Hacking Techn. 14, 53 -68 (2017). https:\/\/api.semanticscholar.org\/CorpusID:3517442","DOI":"10.1007\/s11416-016-0289-8"},{"key":"18_CR10","unstructured":"Fiterau-Brostean, P., Jonsson, B., Merget, R., de\u00a0Ruiter, J., Sagonas, K., Somorovsky, J.: Analysis of dtls implementations using protocol state fuzzing. In: USENIX Security Symposium (2020). https:\/\/api.semanticscholar.org\/CorpusID:219512981"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Fiterau-Brostean, P., Jonsson, B., Sagonas, K., T\u00e5quist, F.: Automata-based automated detection of state machine bugs in protocol implementations. In: Proceedings 2023 Network and Distributed System Security Symposium (2023). https:\/\/api.semanticscholar.org\/CorpusID:257502824","DOI":"10.14722\/ndss.2023.23068"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"von Hippel, M., Vick, C., Tripakis, S., Nita-Rotaru, C.: Automated attacker synthesis for distributed protocols. ArXiv https:\/\/api.semanticscholar.org\/CorpusID:214795205, arXiv: 2004.01220 (2020)","DOI":"10.1007\/978-3-030-54549-9_9"},{"key":"18_CR13","unstructured":"Hjelmvik, E.: Packet injection attacks in the wild. https:\/\/netresec.com\/?b=163e02b, (Accessed 01 March 2016)"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Huang, Y., Shu, H., Kang, F., Guang, Y.: Protocol reverse-engineering methods and tools: A survey. Comput. Commun. 182, 238\u2013254 (2021). https:\/\/api.semanticscholar.org\/CorpusID:244698552","DOI":"10.1016\/j.comcom.2021.11.009"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Huoh, T.L., Luo, Y., Li, P., Zhang, T.: Flow-based encrypted network traffic classification with graph neural networks. IEEE Trans. Netw. Service Manag. 20, 1224\u20131237 (2023). https:\/\/api.semanticscholar.org\/CorpusID:254529893","DOI":"10.1109\/TNSM.2022.3227500"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Hussain, S.R., Karim, I., Ishtiaq, A.A., Chowdhury, O., Bertino, E.: Noncompliance as deviant behavior: An automated black-box noncompliance checker for 4g lte cellular devices. Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (2021). https:\/\/api.semanticscholar.org\/CorpusID:244077785","DOI":"10.1145\/3460120.3485388"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Jero, S., Hoque, M.E., Choffnes, D.R., Mislove, A., Nita-Rotaru, C.: Automated attack discovery in tcp congestion control using a model-guided approach. In: Proceedings of the Applied Networking Research Workshop (2018). https:\/\/api.semanticscholar.org\/CorpusID:3394161","DOI":"10.1145\/3232755.3232769"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Jero, S., Lee, H., Nita-Rotaru, C.: Leveraging state information for automated attack discovery in transport protocol implementations. In: 2015 45th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, pp. 1\u201312 (2015). https:\/\/api.semanticscholar.org\/CorpusID:2679556","DOI":"10.1109\/DSN.2015.22"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Krueger, T., Gascon, H., Kr\u00e4mer, N., Rieck, K.: Learning stateful models for network honeypots. In: Proceedings of the 5th ACM workshop on Security and artificial intelligence (2012), https:\/\/api.semanticscholar.org\/CorpusID:487345","DOI":"10.1145\/2381896.2381904"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Morris, C., Ritzert, M., Fey, M., Hamilton, W.L., Lenssen, J.E., Rattan, G., Grohe, M.: Weisfeiler and leman go neural: higher-order graph neural networks. In: AAAI Conference on Artificial Intelligence (2018). https:\/\/api.semanticscholar.org\/CorpusID:52919090","DOI":"10.1609\/aaai.v33i01.33014602"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Okonkwo, Z., Foo, E., Hou, Z., Li, Q., Jadidi, Z.: Encrypted network traffic classification with higher order graph neural network. In: Australasian Conference on Information Security and Privacy (2023). https:\/\/api.semanticscholar.org\/CorpusID:259213623","DOI":"10.1007\/978-3-031-35486-1_27"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Pacheco, M.L., von Hippel, M., Weintraub, B., Goldwasser, D., Nita-Rotaru, C.: Automated attack synthesis by extracting finite state machines from protocol specification documents. 2022 IEEE Symposium on Security and Privacy (SP), pp. 51\u201368 (2022). https:\/\/api.semanticscholar.org\/CorpusID:247012059","DOI":"10.1109\/SP46214.2022.9833673"},{"key":"18_CR23","unstructured":"de\u00a0Ruiter, J., Poll, E.: Protocol state fuzzing of tls implementations. In: USENIX Security Symposium (2015). https:\/\/api.semanticscholar.org\/CorpusID:16415034"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Savage, S., Cardwell, N., Wetherall, D., Anderson, T.E.: Tcp congestion control with a misbehaving receiver. Comput. Commun. Rev. 29, 71\u201378 (1999). https:\/\/api.semanticscholar.org\/CorpusID:5977820","DOI":"10.1145\/505696.505704"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Sija, B.D., Goo, Y.H., Shim, K.S., Kim, S., Choi, M.J., Kim, M.S.: Survey on network protocol reverse engineering approaches, methods and tools. In: 2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 271\u2013274 (2017), https:\/\/api.semanticscholar.org\/CorpusID:21134516","DOI":"10.1109\/APNOMS.2017.8094126"},{"key":"18_CR26","unstructured":"Stone, C.M., Chothia, T., de\u00a0Ruiter, J.: Extending automated protocol state learning for the 802.11 4-way handshake. In: European Symposium on Research in Computer Security (2018). https:\/\/api.semanticscholar.org\/CorpusID:51985017"},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Wang, Y., et al.: A semantics aware approach to automated reverse engineering unknown protocols. In: 2012 20th IEEE International Conference on Network Protocols (ICNP), pp. 1\u201310 (2012). https:\/\/api.semanticscholar.org\/CorpusID:6898883","DOI":"10.1109\/ICNP.2012.6459963"},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Ye, Y., Zhang, Z., Wang, F., Zhang, X., Xu, D.: Netplier: probabilistic network protocol reverse engineering from message traces. In: Proceedings 2021 Network and Distributed System Security Symposium (2021). https:\/\/api.semanticscholar.org\/CorpusID:231877711","DOI":"10.14722\/ndss.2021.24531"},{"key":"18_CR29","doi-asserted-by":"crossref","unstructured":"Yen, J., L\u2019evai, T., Ye, Q., Ren, X., Govindan, R., Raghavan, B.: Semi-automated protocol disambiguation and code generation. In: Proceedings of the 2021 ACM SIGCOMM 2021 Conference (2020). https:\/\/api.semanticscholar.org\/CorpusID:222290932","DOI":"10.1145\/3452296.3472910"},{"key":"18_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, H., Min, Y., Liu, S., Tong, H., Li, Y., Lv, Z.: Improve the security of industrial control system: a fine-grained classification method for dos attacks on modbus\/tcp. Mobile Netw. Appli. 28, 839\u2013852 (2023). https:\/\/api.semanticscholar.org\/CorpusID:257268182","DOI":"10.1007\/s11036-023-02108-8"},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Zhang, S., Zhai, J., Bu, L., Chen, M., Wang, L., Li, X.: Automated generation of ltl specifications for smart home iot using natural language. In: 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 622\u2013625 (2020). https:\/\/api.semanticscholar.org\/CorpusID:219854669","DOI":"10.23919\/DATE48585.2020.9116374"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5028-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T16:07:30Z","timestamp":1721059650000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5028-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819750276","9789819750283"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5028-3_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"16 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACISP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australasian Conference on Information Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acisp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.acisp24.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}