J. Antunes, N. Neves, and P. Verissimo, Reverse Engineering of Protocols from Network Traces, 2011 18th Working Conference on Reverse Engineering, pp.169-178, 2011.
DOI : 10.1109/WCRE.2011.28

G. Bossert, G. Hiet, and T. Henin, Modelling to Simulate Botnet Command and Control Protocols for the Evaluation of Network Intrusion Detection Systems, 2011 Conference on Network and Information Systems Security, pp.1-8, 2011.
DOI : 10.1109/SAR-SSI.2011.5931397

URL : https://hal.archives-ouvertes.fr/hal-00658396

G. Bossert, Exploiting Semantic for the Automatic Reverse Engineering of Communication Protocols. phdthesis, 2014.
URL : https://hal.archives-ouvertes.fr/tel-01146797

H. Bridger, N. Rishab, G. Phillipa, and J. Rob, Games Without Frontiers: Investigating Video Games as a Covert Channel, Proceedings of the 2016 IEEE European Symposium on Security and Privacy. IEEE European Symposium on Security and Privacy, 2015.

J. Caballero, P. Poosankam, C. Kreibich, and D. Song, Dispatcher, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.621-634, 2009.
DOI : 10.1145/1653662.1653737

J. Caballero and D. Song, Rosetta: Extracting protocol semantics using binary analysis with applications to protocol replay and NAT rewriting, 2007.

J. Caballero, H. Yin, Z. Liang, and D. Song, Polyglot, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.317-329, 2007.
DOI : 10.1145/1315245.1315286

C. Bayerri and J. , Grammar and model extraction for security applications using dynamic program binary analysis, 2010.

W. Cui, V. Paxson, N. Weaver, and R. H. Katz, Protocol-independent adaptive replay of application dialog, Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS). Internet Society, 2006.

W. Cui, M. Peinado, K. Chen, H. J. Wang, and L. Irun-briz, Tupni, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.391-402, 2008.
DOI : 10.1145/1455770.1455820

C. De-la-higuera, Grammatical Inference: Learning Automata and Grammars, 2010.
DOI : 10.1017/CBO9781139194655

URL : https://hal.archives-ouvertes.fr/hal-00476128

E. Hjelmvik and W. John, Breaking and Improving Protocol Obfuscation, 2010.

C. Leita, K. Mermoud, and M. Dacier, ScriptGen: an automated script generation tool for honeyd, 21st Annual Computer Security Applications Conference (ACSAC'05), pp.12-214, 2005.
DOI : 10.1109/CSAC.2005.49

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.330.3033

X. Li and L. Chen, A Survey on Methods of Automatic Protocol Reverse Engineering, 2011 Seventh International Conference on Computational Intelligence and Security, pp.685-689, 2011.
DOI : 10.1109/CIS.2011.156

J. Newsome, D. Brumley, J. Franklin, and D. Song, Replayer, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.311-321, 2006.
DOI : 10.1145/1180405.1180444