{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:14:48Z","timestamp":1763018088580,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3363261","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"2581-2583","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Poster"],"prefix":"10.1145","author":[{"given":"Stephan","family":"Kleber","sequence":"first","affiliation":[{"name":"Ulm University, Ulm, Germany"}]},{"given":"Frank","family":"Kargl","sequence":"additional","affiliation":[{"name":"Ulm University, Ulm, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590346"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866355"},{"volume-title":"Proceedings of 16th USENIX Security Symposium. USENIX Association.","author":"Cui Weidong","key":"e_1_3_2_1_3_1","unstructured":"Weidong Cui , Jayanthkumar Kannan , and Helen J. Wang . 2007. Discoverer:Automatic Protocol Reverse Engineering from Network Traces . In Proceedings of 16th USENIX Security Symposium. USENIX Association. Weidong Cui, Jayanthkumar Kannan, and Helen J. Wang. 2007. Discoverer:Automatic Protocol Reverse Engineering from Network Traces. In Proceedings of 16th USENIX Security Symposium. USENIX Association."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of 2nd International Conference on Knowledge Discoveryand Data Mining. AAAI Press.","author":"Ester Martin","year":"1996","unstructured":"Martin Ester , Hans-Peter Kriegel , J\u00f6rg Sander , and Xiaowei Xu . 1996 . A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise . In Proceedings of 2nd International Conference on Knowledge Discoveryand Data Mining. AAAI Press. Martin Ester, Hans-Peter Kriegel, J\u00f6rg Sander, and Xiaowei Xu. 1996. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise. In Proceedings of 2nd International Conference on Knowledge Discoveryand Data Mining. AAAI Press."},{"key":"e_1_3_2_1_5_1","volume-title":"12th USENIX Workshop on Offensive Technologies(WOOT). USENIX Association.","author":"Kleber Stephan","year":"2018","unstructured":"Stephan Kleber , Henning Kopp , and Frank Kargl . 2018 . NEMESYS: Network Message Syntax Reverse Engineering by Analysis of the Intrinsic Structureof Individual Messages . In 12th USENIX Workshop on Offensive Technologies(WOOT). USENIX Association. Stephan Kleber, Henning Kopp, and Frank Kargl. 2018. NEMESYS: Network Message Syntax Reverse Engineering by Analysis of the Intrinsic Structureof Individual Messages. In 12th USENIX Workshop on Offensive Technologies(WOOT). USENIX Association."},{"key":"e_1_3_2_1_6_1","volume-title":"Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis","author":"Kleber Stephan","year":"2019","unstructured":"Stephan Kleber , Lisa Maile , and Frank Kargl . 2019. Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis . IEEE Communications Surveys and Tutorials, 21, 1, ( February 2019 ). First quarter. Stephan Kleber, Lisa Maile, and Frank Kargl. 2019. Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis. IEEE Communications Surveys and Tutorials, 21, 1, (February 2019). First quarter."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/9.1.60"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.01.013"},{"key":"e_1_3_2_1_9_1","first-page":"49","article-title":"On the Generalized Distance in Statistics","volume":"2","author":"Mahalanobis Prasanta Chandra","year":"1936","unstructured":"Prasanta Chandra Mahalanobis . 1936 . On the Generalized Distance in Statistics . Proceedings of the National Institute of Science of India , 2 , 1, 49 -- 55 . Prasanta Chandra Mahalanobis. 1936. On the Generalized Distance in Statistics. Proceedings of the National Institute of Science of India, 2, 1, 49--55.","journal-title":"Proceedings of the National Institute of Science of India"},{"key":"e_1_3_2_1_10_1","volume-title":"Sabeti","author":"Reshef David N.","year":"2011","unstructured":"David N. Reshef , Yakir A. Reshef , Hilary K. Finucane , Sharon R. Grossman , Gilean McVean , Peter J. Turnbaugh , Eric S. Lander , Michael Mitzenmacher , and Pardis C . Sabeti . 2011 . Detecting Novel Associations in Large Data Sets. Science, 334, 6062, (December 2011), 1518--1524. American Association for the Advancement of Science. David N. Reshef, Yakir A. Reshef, Hilary K. Finucane, Sharon R. Grossman, Gilean McVean, Peter J. Turnbaugh, Eric S. Lander, Michael Mitzenmacher, and Pardis C. Sabeti. 2011. Detecting Novel Associations in Large Data Sets. Science, 334, 6062, (December 2011), 1518--1524. American Association for the Advancement of Science."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2012.6459963"},{"key":"e_1_3_2_1_12_1","volume-title":"Protocol Vulnerability Detection Based on Network Traffic Analysis and Binary Reverse Engineering. PLOS ONE, 12, 10, (October","author":"Wen Shameng","year":"2017","unstructured":"Shameng Wen , Qingkun Meng , Chao Feng , and Chaojing Tang . 2017. Protocol Vulnerability Detection Based on Network Traffic Analysis and Binary Reverse Engineering. PLOS ONE, 12, 10, (October 2017 ). Public Library of Science . Shameng Wen, Qingkun Meng, Chao Feng, and Chaojing Tang. 2017. Protocol Vulnerability Detection Based on Network Traffic Analysis and Binary Reverse Engineering. PLOS ONE, 12, 10, (October 2017). Public Library of Science."}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"London United Kingdom","acronym":"CCS '19"},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3363261","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3363261","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:33Z","timestamp":1750203873000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3363261"}},"subtitle":["Network Message Field Type Recognition"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":12,"alternative-id":["10.1145\/3319535.3363261","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3363261","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}