ACM Transactions on Information and System Security (TISSEC)
Reverse Engineering and Design Recovery: A Taxonomy
IEEE Software
Test Generation with Inputs, Outputs, and Quiescence
TACAs '96 Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems
Passive testing and applications to network management
ICNP '97 Proceedings of the 1997 International Conference on Network Protocols (ICNP '97)
Fault Identification in Networks by Passive Testing
SS '01 Proceedings of the 34th Annual Simulation Symposium (SS01)
Discoverer: automatic protocol reverse engineering from network traces
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Hi-index | 0.00 |
In a system development trajectory (or a life-cycle model) fostered by the "traditional telecommunications" community, it is accepted that implementations are derived from specifications that are assumed correct. These (formal) specifications can then serve as a reference for designing further realizations and for checking their correctness. In a fast development trajectory, characteristic of "new telecommunications", specifications are often fragmentary, informal, or never produced (or disclosed). We propose a reverse-engineering method for specification recovery that is based on passive testing of an implementation that is assumed correct. We illustrate the application of the method with a case study - recovery of the specification of the IAX2 protocol for VoIP systems. It is argued that the method can be instrumental in bridging the gap between the approaches and methods used by both research communities.