Abstract | ||
---|---|---|
Proprietary protocols on the Internet often pose challenges for users and analysts to determine how secure the applications are or how easy private information can be accessed. This work presents a tool that processes packets generated by Skype and analyzes its proprietary implementation. The goal of the exercise is to determine how one may reverse engineer a proprietary protocol and obtain private information. The results demonstrate that a buddy-list of a target user can be obtained through the developed Skype Protocol Analyzer. |
Year | DOI | Venue |
---|---|---|
2013 | 10.1109/CNS.2013.6682735 | IEEE Conference on Communications and Network Security |
Keywords | Field | DocType |
Privacy,Skype,Protocol | Proprietary protocol,Computer science,Computer security,Network packet,Reverse engineering,Computer network,Skype protocol,Private information retrieval,Link Control Protocol,Voice over IP,The Internet | Conference |
ISSN | Citations | PageRank |
2474-025X | 0 | 0.34 |
References | Authors | |
5 | 8 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ray-Guang Cheng | 1 | 330 | 34.73 |
Po-Yao Tsai | 2 | 0 | 0.34 |
Ping-Chen Lin | 3 | 68 | 6.28 |
Chia-Liang Lian | 4 | 0 | 0.34 |
Tse-Han Liu | 5 | 0 | 0.34 |
Hsien-Cheng Chou | 6 | 0 | 0.34 |
Shiao-li Tsao | 7 | 396 | 55.77 |
Shanchieh Yang | 8 | 5 | 2.18 |