C. Results, . Http, . Nb, and . Transf,

. Nb and . Transf, , pp.22-39, 1950.

, Potency

, Costs (absolute) Generation time, pp.137-95, 0119.

T. Iv, . Comparative, . For-tcp-modbus, and . Protocol,

, Nb. transf, vol.1

. Nb and . Transf, , pp.47-107, 0258.

, Potency

, Costs (absolute) Generation time, pp.30-33, 2003.

, REFERENCES

K. P. Dyer, S. E. Coull, and T. Shrimpton, Marionette: A Programmable Network Traffic Obfuscation System, Proc. 24th USENIX Security Symp. USENIX Assoc, pp.367-382, 2015.

E. J. Chikofsky and J. H. Ii, Reverse engineering and design recovery: a taxonomy, IEEE Software, vol.7, issue.1, pp.13-18, 1990.
DOI : 10.1109/52.43044

C. Eagle, The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler, 2008.

, Radare2 github repository, " https://github.com/radare/radare2, 2017.

J. Narayan, S. K. Shukla, and T. C. Clancy, A Survey of Automatic Protocol Reverse Engineering Tools, ACM Computing Surveys, vol.48, issue.3, p.40, 2015.
DOI : 10.1109/ICDMA.2012.125

X. Li and L. Chen, A Survey on Methods of Automatic Protocol Reverse Engineering, 2011 Seventh International Conference on Computational Intelligence and Security, pp.685-689, 2011.
DOI : 10.1109/CIS.2011.156

J. Duchêne, C. Le-guernic, E. Alata, V. Nicomette, and M. Kaâniche, State of the art of network protocol reverse engineering tools, Journal of Computer Virology and Hacking Techniques, vol.19, issue.2, pp.1-16, 2017.
DOI : 10.1007/978-3-319-26362-5

M. Beddoe, Protocol Informatics Project, 2004.

, Network Protocol Analysis using Bioinformatics Algorithms, 2004.

J. Antunes, N. Neves, and P. Verissimo, Reverse Engineering of Protocols from Network Traces, 2011 18th Working Conference on Reverse Engineering, pp.169-178, 2011.
DOI : 10.1109/WCRE.2011.28

G. Bossert, F. Guihery, and G. Hiet, Towards automated protocol reverse engineering using semantic information, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, pp.51-62, 2014.
DOI : 10.1145/2590296.2590346

URL : https://hal.archives-ouvertes.fr/hal-01009283

G. Bossert, Exploiting Semantic for the Automatic Reverse Engineering of Communication Protocols, 2014.
URL : https://hal.archives-ouvertes.fr/tel-01146797

J. Lim, T. Reps, and B. Liblit, Extracting Output Formats from Executables, 2006 13th Working Conference on Reverse Engineering, pp.167-178, 2006.
DOI : 10.1109/WCRE.2006.29

URL : http://cs.wisc.edu/~liblit/wcre-2006/wcre-2006.pdf

J. Caballero, P. Poosankam, C. Kreibich, and D. Song, Dispatcher, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.621-634, 2009.
DOI : 10.1145/1653662.1653737

J. and C. Bayerri, Grammar and model extraction for security applications using dynamic program binary analysis, 2010.

J. Caballero and D. Song, Automatic protocol reverse-engineering: Message format extraction and field semantics inference, Comput. Networks, pp.451-474, 2013.
DOI : 10.1016/j.comnet.2012.08.003

URL : http://www.cs.berkeley.edu/%7Edawnsong/papers/2012%20Automatic%20Protocol%20Reverse%20Engineering.pdf

P. Comparetti, G. Wondracek, C. Kruegel, and E. Kirda, Prospex: Protocol Specification Extraction, 2009 30th IEEE Symposium on Security and Privacy, pp.110-125, 2009.
DOI : 10.1109/SP.2009.14

URL : http://security.riit.tsinghua.edu.cn/mediawiki/images/8/87/Prospex-paper.pdf

C. Y. Cho, D. Babi´cbabi´c, E. C. Shin, and D. Song, Inference and analysis of formal models of botnet command and control protocols, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.426-439, 2010.
DOI : 10.1145/1866307.1866355

URL : http://www.cs.berkeley.edu/%7Edawnsong/papers/ccs10botnets.pdf

C. Y. Cho, D. Babi´cbabi´c, P. Poosankam, K. Z. Chen, E. X. Wu et al., MACE: model-inference-assisted concolic exploration for protocol and vulnerability discovery, Proc. 20th USENIX Conf. Security, ser. SEC'11, p.19, 2011.

J. Caballero, H. Yin, Z. Liang, and D. Song, Polyglot, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.317-329, 2007.
DOI : 10.1145/1315245.1315286

Z. Wang, X. Jiang, W. Cui, X. Wang, and M. Grace, ReFormat: Automatic Reverse Engineering of Encrypted Messages, Comput, pp.200-215, 2009.
DOI : 10.1109/SP.2009.14

URL : http://www.cs.berkeley.edu/~wdc/papers/reformat-esorics09.pdf

B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai et al., On the (im) possibility of obfuscating programs, Ann. Int'l Cryptology Conf, pp.1-18, 2001.
DOI : 10.1145/2160158.2160159

URL : http://www.cs.cmu.edu/afs/cs.cmu.edu/user/rudich/www/papers/obfuscators.ps

, On the (im)possibility of obfuscating programs, J. ACM, vol.59, issue.6, pp.1-6, 2012.

H. Xu and M. R. Lyu, Assessing the Security Properties of Software Obfuscation, IEEE Security & Privacy, vol.14, issue.5, pp.80-83, 1997.
DOI : 10.1109/MSP.2016.112

W. Cho, I. Lee, and S. Park, Against intelligent tampering: Software tamper resistance by extended control flow obfuscation, Proc. World Multiconference on Systems, Cybern., and Informatics, 2001.

C. Collberg, C. Thomborson, and D. Low, Manufacturing cheap, resilient, and stealthy opaque constructs, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, pp.184-196, 1998.
DOI : 10.1145/268946.268962

T. Ogiso, Y. Sakabe, M. Soshi, and A. Miyaji, Software obfuscation on a theoretical basis and its implementation, IEICE Trans. Fundamentals of Electron., Commun. and Comput. Sci, vol.86, issue.1, pp.176-186, 2003.

C. Wang, J. Hill, J. Knight, and J. Davidson, Software tamper resistance: Obstructing static analysis of programs, 2000.

G. Wroblewski, General method of program code obfuscation, Ph.D. dissertation, Inst. of Eng. Cybern, 2002.

C. Linn and S. Debray, Obfuscation of executable code to improve resistance to static disassembly, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, pp.290-299, 2003.
DOI : 10.1145/948109.948149

J. Cappaert and B. Preneel, A general model for hiding control flow, Proceedings of the tenth annual ACM workshop on Digital rights management, DRM '10, pp.35-42, 2010.
DOI : 10.1145/1866870.1866877

S. Schrittwieser and S. Katzenbeisser, Code Obfuscation against Static and Dynamic Reverse Engineering, Inform. Hiding, pp.270-284, 2011.
DOI : 10.1007/978-3-540-77360-3_17

M. Egele, T. Scholte, E. Kirda, and C. Kruegel, A survey on automated dynamic malware-analysis techniques and tools, ACM Computing Surveys, vol.44, issue.2, p.6, 2012.
DOI : 10.1145/2089125.2089126

S. Blazy, S. Riaud, and T. Sirvent, Data tainting and obfuscation: Improving plausibility of incorrect taint, 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM), pp.111-120, 2015.
DOI : 10.1109/SCAM.2015.7335407

URL : https://hal.archives-ouvertes.fr/hal-01193286

P. Winter, T. Pulls, and J. Fuss, ScrambleSuit, Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, WPES '13, pp.213-224, 2013.
DOI : 10.1145/2517840.2517856

. Tor-team and . Obfsproxy, , 2017.

Z. Weinberg, J. Wang, V. Yegneswaran, L. Briesemeister, S. Cheung et al., StegoTorus, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.109-120, 2012.
DOI : 10.1145/2382196.2382211

H. Mohajeri-moghaddam, B. Li, M. Derakhshani, and I. Goldberg, SkypeMorph, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12
DOI : 10.1145/2382196.2382210

A. Conf, . Comput, and . Commun, Security, ser. CCS '12, pp.97-108, 2012.

J. Geddes, M. Schuchard, and N. Hopper, Cover your ACKs, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.361-372, 2013.
DOI : 10.1145/2508859.2516742

A. Houmansadr, T. J. Riedl, N. Borisov, and A. C. Singer, I want my voice to be heard: Ip over voice-over-ip for unobservable censorship circumvention, NDSS, 2013.

S. Li, M. Schliep, and N. Hopper, Facet, Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES '14, pp.163-172, 2014.
DOI : 10.1145/2382196.2382211

H. Bridger, N. Rishab, G. Phillipa, and J. Rob, Games Without Frontiers: Investigating Video Games as a Covert Channel, Proc. 2016 IEEE European Symp. Security and Privacy, ser. IEEE European Symp. Security and Privacy, 2015.

K. P. Dyer, S. E. Coull, T. Ristenpart, and T. Shrimpton, Protocol misidentification made easy with format-transforming encryption, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.61-72, 2013.
DOI : 10.1145/2508859.2516657

C. De and . Higuera, Grammatical Inference: Learning Automata and Grammars, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00476128

A. Swales, Open modbus/tcp specification, Tech. Rep, 1999.

R. Fielding and J. Reschke, Hypertext transfer protocol (http/1.1): Message syntax and routing, Internet Eng. Task Force, Tech. Rep, 2014.
DOI : 10.17487/rfc7230