Review Article

A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View

Table 2

Approaches, methods, and tools that focus on reverse engineering PFSMs.

Approach, method, tool, or authorYear Input formatSpecial remarks
NetTExeT

PEXT [16]2007Limitation in extracting semantic information
Xiao et al. [3]2009~
Trifilo et al. [17]2009~
Antunes and Neves [18]2009~
ReverX [19]2011~
Veritas [20]2011~
Zhang et al. [21]2012~
Laroche et al. [22]2013~
Meng et al. [23]2014~