Review Article

A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View

Table 4

Approaches that focus on neither reverse engineering general PFs nor PFSMs.

Approach, method, tool, or authorYear Input formatSpecial remarks
NetTExeT

ScriptGen [29]2005Dialogs/scripts
RolePlayer [30]2006Dialogs/scripts
Ma et al. [31]2006App-identification
Boosting [32]2008Field(s)
Dispatcher [6]2009C&C malware
ASAP [33]2011Semantics
Dispatcher2 [34]2013C&C malware
ProVeX [35]2013Signatures
PIP [36]2014Keywords/ fields
FieldHunter [37]2015Fields
RS Cluster [38]2015Grouped-messages
UPCSS [39]2015Proto-classification
PowerShell [40]2017Dialogs/scripts
ProPrint [41]2017Fingerprints
ProHacker [42]2017Keywords