Review Article
A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View
Table 2
Approaches, methods, and tools that focus on reverse engineering PFSMs.
| Approach, method, tool, or author | Year | Input format | Special remarks | NetT | ExeT |
| PEXT [16] | 2007 | | ○ | Limitation in extracting semantic information | Xiao et al. [3] | 2009 | ○ | ○ | ~ | Trifilo et al. [17] | 2009 | ○ | | ~ | Antunes and Neves [18] | 2009 | ○ | | ~ | ReverX [19] | 2011 | ○ | | ~ | Veritas [20] | 2011 | ○ | | ~ | Zhang et al. [21] | 2012 | ○ | | ~ | Laroche et al. [22] | 2013 | ○ | | ~ | Meng et al. [23] | 2014 | ○ | | ~ |
|
|