1. Bossert, G., Guihéry, F., Hiet, G.: Towards automated protocol reverse engineering using semantic information. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (2014). https://api.semanticscholar.org/CorpusID:9258200
2. de Carvalho Bertoli, G., Pereira Júnior, L.A., F.A.N.V.O.S.: Probing dataset (version v1.0.0). https://github.com/gubertoli/ProbingDataset, (Accessed: 2019)
3. Chen, Y., et al.: Devils in the guidance: Predicting logic vulnerabilities in payment syndication services through automated documentation analysis. In: USENIX Security Symposium (2019). https://api.semanticscholar.org/CorpusID:199536001
4. Cho, C.Y., Babic, D., Poosankam, P., Chen, K.Z., Wu, E.X., Song, D.X.: Mace: model-inference-assisted concolic exploration for protocol and vulnerability discovery. In: USENIX Security Symposium (2011). https://api.semanticscholar.org/CorpusID:811610
5. Comparetti, P.M., Wondracek, G., Krügel, C., Kirda, E.: Prospex: Protocol specification extraction. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 110–125 (2009). https://api.semanticscholar.org/CorpusID:1170665