Reverse Engineering of Protocols from Network Traces, 2011 18th Working Conference on Reverse Engineering, pp.169-178, 2011. ,
DOI : 10.1109/WCRE.2011.28
Modelling to Simulate Botnet Command and Control Protocols for the Evaluation of Network Intrusion Detection Systems, 2011 Conference on Network and Information Systems Security, pp.1-8, 2011. ,
DOI : 10.1109/SAR-SSI.2011.5931397
URL : https://hal.archives-ouvertes.fr/hal-00658396
Exploiting Semantic for the Automatic Reverse Engineering of Communication Protocols. phdthesis, 2014. ,
URL : https://hal.archives-ouvertes.fr/tel-01146797
Games Without Frontiers: Investigating Video Games as a Covert Channel, Proceedings of the 2016 IEEE European Symposium on Security and Privacy. IEEE European Symposium on Security and Privacy, 2015. ,
Dispatcher, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.621-634, 2009. ,
DOI : 10.1145/1653662.1653737
Rosetta: Extracting protocol semantics using binary analysis with applications to protocol replay and NAT rewriting, 2007. ,
Polyglot, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.317-329, 2007. ,
DOI : 10.1145/1315245.1315286
Grammar and model extraction for security applications using dynamic program binary analysis, 2010. ,
Protocol-independent adaptive replay of application dialog, Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS). Internet Society, 2006. ,
Tupni, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.391-402, 2008. ,
DOI : 10.1145/1455770.1455820
Grammatical Inference: Learning Automata and Grammars, 2010. ,
DOI : 10.1017/CBO9781139194655
URL : https://hal.archives-ouvertes.fr/hal-00476128
Breaking and Improving Protocol Obfuscation, 2010. ,
ScriptGen: an automated script generation tool for honeyd, 21st Annual Computer Security Applications Conference (ACSAC'05), pp.12-214, 2005. ,
DOI : 10.1109/CSAC.2005.49
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.330.3033
A Survey on Methods of Automatic Protocol Reverse Engineering, 2011 Seventh International Conference on Computational Intelligence and Security, pp.685-689, 2011. ,
DOI : 10.1109/CIS.2011.156
Replayer, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.311-321, 2006. ,
DOI : 10.1145/1180405.1180444