-
Notifications
You must be signed in to change notification settings - Fork 0
Home
Hussein Marah edited this page Aug 4, 2020
·
4 revisions
RE4TinyOS is a tool that performs reverse engineering on TinyOS applications (nesC codes) and represents them on a high abstraction level (model). RE4TinyOS so far has been tested on a bunch of applications and these applications have been represented as a model without any problems. It is possible to test the tool on the following applications:
- AntiTheft -> https://github.com/tinyos/tinyos-main/tree/master/apps/AntiTheft/Nodes
- Sense -> https://github.com/tinyos/tinyos-main/tree/master/apps/Sense
- MultihopOscilloscope -> https://github.com/tinyos/tinyos-main/tree/master/apps/MultihopOscilloscope
- Blink -> https://github.com/tinyos/tinyos-main/tree/master/apps/Blink
Once you run the RE4TinyOS tool, a menu to open the "Module" and "Configuration" will pop-up, a "Module" file usually ends with C.nc
while the "Configuration" file usually ends with App.nc
.
Note: it's possible that the RE4TinyOS tool will not be able to read some codes, in this situation some modifications on the "TinyOS Parser" grammar are needed.