{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T19:38:00Z","timestamp":1776886680370,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,4]],"date-time":"2014-06-04T00:00:00Z","timestamp":1401840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,4]]},"DOI":"10.1145\/2590296.2590346","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"51-62","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":99,"title":["Towards automated protocol reverse engineering using semantic information"],"prefix":"10.1145","author":[{"given":"Georges","family":"Bossert","sequence":"first","affiliation":[{"name":"AMOSSYS, Rennes, France"}]},{"given":"Fr\u00e9d\u00e9ric","family":"Guih\u00e9ry","sequence":"additional","affiliation":[{"name":"AMOSSYS, Rennes, France"}]},{"given":"Guillaume","family":"Hiet","sequence":"additional","affiliation":[{"name":"Supelec\/Inria, Rennes, France"}]}],"member":"320","published-online":{"date-parts":[[2014,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.28"},{"key":"e_1_3_2_1_2_1","volume-title":"Toorcon","author":"Beddoe M. A.","year":"2004","unstructured":"M. A. Beddoe . Network protocol analysis using bioinformatics algorithms . In Toorcon , 2004 . M. A. Beddoe. Network protocol analysis using bioinformatics algorithms. In Toorcon, 2004."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653737"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315286"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.14"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of USENIX Security Symposium","author":"Cui W.","year":"2007","unstructured":"W. Cui . Discoverer : Automatic protocol reverse engineering from network traces . In Proceedings of USENIX Security Symposium , 2007 . W. Cui. Discoverer: Automatic protocol reverse engineering from network traces. In Proceedings of USENIX Security Symposium, 2007."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of NDSS","author":"Cui W.","year":"2006","unstructured":"W. Cui , V. Paxson , N. C. Weaver , and Y. H. Katz . Protocol-independent adaptive replay of application dialog . In Proceedings of NDSS , 2006 . W. Cui, V. Paxson, N. C. Weaver, and Y. H. Katz. Protocol-independent adaptive replay of application dialog. In Proceedings of NDSS, 2006."},{"key":"e_1_3_2_1_8_1","volume-title":"O'Reilly Android Open Conference","author":"Freeman J.","year":"2011","unstructured":"J. Freeman . Hacking a closed ecosystem . In O'Reilly Android Open Conference , 2011 . J. Freeman. Hacking a closed ecosystem. In O'Reilly Android Open Conference, 2011."},{"key":"e_1_3_2_1_9_1","volume-title":"HP Laboratories Palo Alto, aug","author":"Gargi U.","year":"2003","unstructured":"U. Gargi . Consumer media capture: Time-based analysis and event clustering. Technical report , HP Laboratories Palo Alto, aug 2003 . U. Gargi. Consumer media capture: Time-based analysis and event clustering. Technical report, HP Laboratories Palo Alto, aug 2003."},{"key":"e_1_3_2_1_10_1","volume-title":"Black Hat USA","author":"Guarnieri C.","year":"2013","unstructured":"C. Guarnieri , M. Schloesser , J. Bremer , and A. Tanasi . Cuckoo sandbox - open source automated malware analysis . In Black Hat USA , 2013 . C. Guarnieri, M. Schloesser, J. Bremer, and A. Tanasi. Cuckoo sandbox - open source automated malware analysis. In Black Hat USA, 2013."},{"key":"e_1_3_2_1_11_1","volume-title":"Design and validation of computer protocols","author":"Holzmann G. J.","year":"1991","unstructured":"G. J. Holzmann . Design and validation of computer protocols . Prentice-Hall, Inc. , 1991 . G. J. Holzmann. Design and validation of computer protocols. Prentice-Hall, Inc., 1991."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381896.2381904"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1997358.1997363"},{"key":"e_1_3_2_1_14_1","series-title":"IFIP Advances in Information and Communication Technology","volume-title":"Emerging Challenges for Security, Privacy and Trust","author":"Leder F.","year":"2009","unstructured":"F. Leder and P. Martini . Ngbpa next generation botnet protocol analysis . In Emerging Challenges for Security, Privacy and Trust , volume 297 of IFIP Advances in Information and Communication Technology . Springer Berlin Heidelberg , 2009 . F. Leder and P. Martini. Ngbpa next generation botnet protocol analysis. In Emerging Challenges for Security, Privacy and Trust, volume 297 of IFIP Advances in Information and Communication Technology. Springer Berlin Heidelberg, 2009."},{"key":"e_1_3_2_1_15_1","volume-title":"Algorithms for non-negative matrix factorization","author":"Lee D. D.","year":"2000","unstructured":"D. D. Lee and H. S. Seung . Algorithms for non-negative matrix factorization . In NIPS. MIT Press , 2000 . D. D. Lee and H. S. Seung. Algorithms for non-negative matrix factorization. In NIPS. MIT Press, 2000."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.49"},{"key":"e_1_3_2_1_17_1","volume-title":"Procedings of NDSS","author":"Lin Z.","year":"2008","unstructured":"Z. Lin , X. Jiang , D. Xu , and X. Zhang . Automatic protocol format reverse engineering through context-aware monitored execution . In Procedings of NDSS , 2008 . Z. Lin, X. Jiang, D. Xu, and X. Zhang. Automatic protocol format reverse engineering through context-aware monitored execution. In Procedings of NDSS, 2008."},{"key":"e_1_3_2_1_18_1","volume-title":"Kindsight Security Lab","author":"McNamee K.","year":"2012","unstructured":"K. McNamee . Malware analysis report - new c&c protocol for zeroacess\/siref. Technical report , Kindsight Security Lab , 2012 . K. McNamee. Malware analysis report - new c&c protocol for zeroacess\/siref. Technical report, Kindsight Security Lab, 2012."},{"key":"e_1_3_2_1_19_1","first-page":"48","article-title":"A general method applicable to the search for similarities in the amino acid sequence of two proteins","author":"Needleman S. B.","year":"1970","unstructured":"S. B. Needleman and C. D. Wunsch . A general method applicable to the search for similarities in the amino acid sequence of two proteins . Journal of Molecular Biology , 48 , 1970 . S. B. Needleman and C. D. Wunsch. A general method applicable to the search for similarities in the amino acid sequence of two proteins. Journal of Molecular Biology, 48, 1970.","journal-title":"Journal of Molecular Biology"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863994"},{"key":"e_1_3_2_1_21_1","first-page":"334","article-title":"Detecting novel associations in large data sets","author":"Reshef D. N.","year":"2011","unstructured":"D. N. Reshef , Y. A. Reshef , H. K. Finucane , S. R. Grossman , G. McVean , P. J. Turnbaugh , E. S. Lander , M. Mitzenmacher , and P. C. Sabeti . Detecting novel associations in large data sets . Science , 334 , 2011 . D. N. Reshef, Y. A. Reshef, H. K. Finucane, S. R. Grossman, G. McVean, P. J. Turnbaugh, E. S. Lander, M. Mitzenmacher, and P. C. Sabeti. Detecting novel associations in large data sets. Science, 334, 2011.","journal-title":"Science"},{"key":"e_1_3_2_1_22_1","volume-title":"Journal of Machine Learning Research","author":"Rieck K.","year":"2012","unstructured":"K. Rieck , C. Wressnegger , and A. Bikadorov . Sally: A tool for embedding strings in vector spaces . Journal of Machine Learning Research , 2012 . K. Rieck, C. Wressnegger, and A. Bikadorov. Sally: A tool for embedding strings in vector spaces. Journal of Machine Learning Research, 2012."},{"key":"e_1_3_2_1_23_1","volume-title":"Symantec","author":"Shearer J.","year":"2011","unstructured":"J. Shearer . Trojan. zeroaccess threat report. Technical report , Symantec , 2011 . J. Shearer. Trojan.zeroaccess threat report. Technical report, Symantec, 2011."},{"key":"e_1_3_2_1_24_1","volume-title":"A statistical method for evaluating systematic relationships","author":"Sokal R. R.","year":"1958","unstructured":"R. R. Sokal and C. D. Michener . A statistical method for evaluating systematic relationships . University of Kansas Scientific Bulletin , 1958 . R. R. Sokal and C. D. Michener. A statistical method for evaluating systematic relationships. University of Kansas Scientific Bulletin, 1958."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/647269.721853"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2012.6459963"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/2025968.2025970"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.45"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1622176.1622213"}],"event":{"name":"ASIA CCS '14: 9th ACM Symposium on Information, Computer and Communications Security","location":"Kyoto Japan","acronym":"ASIA CCS '14","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 9th ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590346","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2590296.2590346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:52Z","timestamp":1750229752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590346"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,4]]},"references-count":29,"alternative-id":["10.1145\/2590296.2590346","10.1145\/2590296"],"URL":"https:\/\/doi.org\/10.1145\/2590296.2590346","relation":{},"subject":[],"published":{"date-parts":[[2014,6,4]]},"assertion":[{"value":"2014-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}