%0 Journal Article %A Newsome, James %A Brumley, David %A Franklin, Jason %A Song, Dawn %D 2006 %T Replayer: Automatic Protocol Replay by Binary Analysis %U https://kilthub.cmu.edu/articles/journal_contribution/Replayer_Automatic_Protocol_Replay_by_Binary_Analysis/6469232 %R 10.1184/R1/6469232.v1 %2 https://kilthub.cmu.edu/ndownloader/files/11897786 %K security %K application protocol replay %K weakest pre-condition %X We address the problem of replaying an application dialog between two hosts. The ability to accurately replay application dialogs is useful in many security-oriented applications, such as replaying an exploit for forensic analysis or demonstrating an exploit to a third party. A central challenge in application dialog replay is that the dialog intended for the original host will likely not be accepted by another without modification. For example, the dialog may include or rely on state specific to the original host such as its hostname, a known cookie, etc. In such cases, a straight-forward byte-by-byte replay to a different host with a different state (e.g., different hostname) than the original observed dialog participant will likely fail. These state- dependent protocol fields must be updated to reflect the different state of the different host for replay to succeed. We formally define the replay problem. We present a solution which makes novel use of program verification techniques such as theorem proving and weakest pre-condition. By employing these techniques, we create the first sound solution to the replay problem: replay succeeds whenever our approach yields an answer. Previous techniques, though useful, are based on unsound heuristics. We implement a prototype of our techniques called Replayer, which we use to demonstrate the viability of our approach. %I Carnegie Mellon University