TY - JOUR AU - Ládi, Gergő AU - Holczer, Tamás TI - On the Performance Evaluation of Protocol State Machine Reverse Engineering Methods JF - JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS J2 - J COMM SOFTW SYST VL - 20 PY - 2024 IS - 1 SP - 76 EP - 87 PG - 12 SN - 1845-6421 DO - 10.24138/jcomss-2023-0149 UR - https://m2.mtmt.hu/api/publication/34564106 ID - 34564106 LA - English DB - MTMT ER - TY - JOUR AU - Székely, Gábor AU - Ládi, Gergő AU - Holczer, Tamás AU - Buttyán, Levente TI - Protocol State Machine Reverse Engineering with a Teaching-Learning Approach JF - ACTA CYBERNETICA J2 - ACTA CYBERN-SZEGED VL - 25 PY - 2021 IS - 2 SP - 517 EP - 535 PG - 19 SN - 0324-721X DO - 10.14232/actacyb.288213 UR - https://m2.mtmt.hu/api/publication/32707253 ID - 32707253 N1 - Laboratory of Cryptography and System Security, Department of Networked Systems and Services, Budapest University of Technology and Economics, Hungary Ukatemi Technologies, Hungary BME Balatonfüred Student Research Group, Hungary Export Date: 2 May 2022 CODEN: ACCYD LA - English DB - MTMT ER - TY - CONF AU - Holczer, Tamás AU - BERMAN, G. AU - DARRICADES, S. M. AU - GYÖRGY, P. AU - Ládi, Gergő TI - VIRTUALIZATION-ASSISTED TESTING OF NETWORK SECURITY SYSTEMS FOR NPPS T2 - International Conference on Nuclear Security: Sustaining and Strengthening Efforts PB - International Atomic Energy Agency (IAEA) PY - 2020 SP - 1 EP - 10 PG - 10 UR - https://m2.mtmt.hu/api/publication/31608017 ID - 31608017 N1 - https://media.superevent.com/documents/20200212/70ab1863f4ba4320325b31e44c0666c4/id-454-holczer-paper.pdf LA - English DB - MTMT ER - TY - JOUR AU - Ládi, Gergő AU - Buttyán, Levente AU - Holczer, Tamás TI - GrAMeFFSI: Graph Analysis Based Message Format and Field Semantics Inference For Binary Protocols, Using Recorded Network Traffic JF - INFOCOMMUNICATIONS JOURNAL J2 - INFOCOMM J VL - 12 PY - 2020 IS - 2 SP - 25 EP - 33 PG - 9 SN - 2061-2079 DO - 10.36244/ICJ.2020.2.4 UR - https://m2.mtmt.hu/api/publication/31604651 ID - 31604651 N1 - Laboratory of Cryptography and System Security, Department of Networked Systems and Services, Budapest University of Technology and Economics, Budapest, Hungary BME Balatonfüred Student Research Group, Hungary Export Date: 28 October 2021 AB - Protocol specifications describe the interaction between different entities by defining message formats and message processing rules. Having access to such protocol specifications is highly desirable for many tasks, including the analysis of botnets, building honeypots, defining network intrusion detection rules, and fuzz testing protocol implementations. Unfortunately, many protocols of interest are proprietary, and their specifications are not publicly available. Protocol reverse engineering is an approach to reconstruct the specifications of such closed protocols. Protocol reverse engineering can be tedious work if done manually, so prior research focused on automating the reverse engineering process as much as possible. Some approaches rely on access to the protocol implementation, but in many cases, the protocol implementation itself is not available or its license does not permit its use for reverse engineering purposes. Hence, in this paper, we focus on reverse engineering protocol specifications relying solely on recorded network traffic. More specifically, we propose GrAMeFFSI, a method based on graph analysis that can infer protocol message formats as well as certain field semantics for binary protocols from network traces. We demonstrate the usability of our approach by running it on packet captures of two known protocols, Modbus and MQTT, then comparing the inferred specifications to the official specifications of these protocols. LA - English DB - MTMT ER - TY - CONF AU - Székely, Gábor AU - Ládi, Gergő AU - Holczer, Tamás AU - Buttyán, Levente TI - Towards Reverse Engineering Protocol State Machines T2 - The 12th Conference of PhD Students in Computer Science PB - Szegedi Tudományegyetem (SZTE) C1 - Szeged PY - 2020 SP - 70 EP - 73 PG - 4 UR - https://m2.mtmt.hu/api/publication/31360878 ID - 31360878 AB - In this work, we are addressing the problem of inferring the state machine of an unknown protocol. Our method is based on prior work on inferring Mealy machines. We require access to and interaction with a system that runs the unknown protocol, and we serve a state-of-the-art Mealy machine inference algorithm with appropriate input obtained from the system at hand. We implemented our method and illustrate its operation on a simple example protocol. LA - English DB - MTMT ER - TY - CHAP AU - Ládi, Gergő AU - Buttyán, Levente AU - Holczer, Tamás TI - Message Format and Field Semantics Inference for Binary Protocols Using Recorded Network Traffic T2 - 2018 26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM) PB - University of Split, Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture CY - Split SN - 9789532900873 PY - 2018 PG - 6 DO - 10.23919/SOFTCOM.2018.8555813 UR - https://m2.mtmt.hu/api/publication/30352812 ID - 30352812 LA - English DB - MTMT ER - TY - CHAP AU - Ládi, Gergő ED - Orosz, Gábor Tamás TI - Semantics-Preserving Encryption for Computer Networking Related Data Types T2 - AIS 2017 - 12th International Symposium on Applied Informatics and Related Areas organized in the frame of Hungarian Science Festival 2017 by Óbuda University PB - Óbudai Egyetem CY - Székesfehérvár SN - 9789634490326 PY - 2017 SP - 176 EP - 181 PG - 6 UR - https://m2.mtmt.hu/api/publication/3343530 ID - 3343530 LA - English DB - MTMT ER - TY - CONF AU - Ládi, Gergő ED - Dinko, Begušić ED - Nikola, Rožić ED - Joško, Radić ED - Matko, Šarić TI - Transparent Encryption for Cloud-based Services T2 - Workshop on Information and Communication Technologies, Proceedings PB - University of Split, Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture C1 - Split PY - 2017 SP - 64 EP - 68 PG - 5 UR - https://m2.mtmt.hu/api/publication/3343528 ID - 3343528 LA - English DB - MTMT ER - TY - CONF AU - Ládi, Gergő ED - Gerhátné, Dr. Udvary Eszter TI - Transparent Encryption for Cloud-based Services T2 - Mesterpróba 2017: Tudományos konferencia végzős MSc és elsőéves PhD hallgatóknak Távközlés és infokommunikáció témakörében PY - 2017 SP - 5 EP - 8 PG - 4 UR - https://m2.mtmt.hu/api/publication/3335077 ID - 3335077 AB - Transparent encryption is a method that involves encrypting data locally, on the user's computer, just before it is sent to cloud services to be stored, then decrypting said data later, straight after it is retrieved from the cloud service. All this takes place without having to alter the client application or the remote service (hence transparent). Applying this method ensures that even if the user's account or the provider itself is compromised, the attackers can only retrieve encrypted data that is useless without the encryption keys. This paper illustrates the design of a system that is capable of performing transparent encryption for various cloud-based services. LA - English DB - MTMT ER -