Review Article
A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View
Table 1
Approaches, methods, and tools that focus on reverse engineering PFs; NetT = network traces; ExeT = execution traces.
| Approach, method, tool, or author | Year | Input format | Special remarks | NetT | ExeT |
| Discoverer [4] | 2007 | ○ | | PFSM for future work | Polyglot [5] | 2007 | | ○ | Dispatcher [6] 1st work | AutoFormat [7] | 2008 | | ○ | ~ | Tupni [8] | 2008 | | ○ | PFSM for future work | ReFormat [9] | 2009 | | ○ | Decryption before PRE | Prospex [10] | 2009 | ○ | | Reverse engineers PFSM as well | ProDecoder [11] | 2012 | ○ | | ~ | Wang et al. [12] | 2013 | ○ | | PRE in wireless environment | ProGraph [13] | 2015 | ○ | | Traffic classification | Cai et al. [14] | 2016 | ○ | | ~ | WASp [15] | 2016 | ○ | | IEEE.802.15.4 wireless protocols |
|
|