IoT Application-Layer Protocol Vulnerability Detection using Reverse Engineering.
Jian-Zhen LuoChun ShanJun CaiYan LiuPublished in: Symmetry (2018)
Keyphrases
- application layer
- reverse engineering
- software engineering
- network layer
- end to end
- dynamic analysis
- application layer multicast
- software maintenance
- video streaming
- transport layer
- physical layer
- object oriented
- gene regulatory networks
- cross layer
- program understanding
- network congestion
- reverse engineer
- ddos attacks
- overlay network
- video streams
- end users
- database
- cloud computing
- metadata
- databases