, Évolution des contributions pour l'inférence de protocole basée sur l'analyse d'application. Les outils utilisant une approche active sont mis en gras Inférence applicative Format du Grammaire du message protocole, FFE, issue.2, p.86, 2006.

. Replayer and . Newsome, , 2006.

. Polyglot and . Caballero, , 2007.

. Autoformat and . Lin, , 2008.

. Tupni and . Cui, , 2008.

. Prospex and . Wondracek, , 2008.

. Prospex and . Comparetti, , 2009.

(. Z. Reformat and . Wang, , p.2010, 2009.

. Howard and . Slowinska, , 2011.

. Caballero, ARTISTE, 2012.

, Dispatcher, 2013.

, ARGOS, 2015.

. La-mesure-de-l, entropie des données auraient pu être utilisées et fournir des résultats intéressants Ce défi s'apparente au problème du placement des sondes présenté en section 3.1, mais le but ici est de déterminer automatiquement où placer une sonde de capture de messages dans une application binaire

, Bibliographie

D. Angluin, Learning regular sets from queries and counterexamples, Information and Computation, vol.75, issue.2, pp.87-106, 1987.
DOI : 10.1016/0890-5401(87)90052-6

J. Antunes, N. Neves, and P. Verissimo, Reverse Engineering of Protocols from Network Traces, 2011 18th Working Conference on Reverse Engineering, pp.169-178, 2011.
DOI : 10.1109/WCRE.2011.28

M. Beddoe, Network Protocol Analysis using Bioinformatics Algorithms, 2004.

M. Beddoe, Protocol Informatics Project, 2004.

T. Bohlin and B. Jonsson, Regular Inference for Communication Protocol Entities, 2008.

G. Bossert, Exploiting Semantic for the Automatic Reverse Engineering of Communication Protocols, 2014.
URL : https://hal.archives-ouvertes.fr/tel-01146797

G. Bossert, F. Guihery, and G. Hiet, Towards automated protocol reverse engineering using semantic information, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, pp.51-62, 2014.
DOI : 10.1145/2590296.2590346

URL : https://hal.archives-ouvertes.fr/hal-01009283

G. Bossert, G. Hiet, and T. Henin, Modelling to Simulate Botnet Command and Control Protocols for the Evaluation of Network Intrusion Detection Systems, 2011 Conference on Network and Information Systems Security, pp.1-8, 2011.
DOI : 10.1109/SAR-SSI.2011.5931397

URL : https://hal.archives-ouvertes.fr/hal-00658396

J. Caballero, G. Grieco, M. Marron, Z. Lin, and D. Urbina, ARTISTE: Automatic Generation of Hybrid Data Structure Signatures from Binary Code Executions, 2012.

J. Caballero, P. Poosankam, C. Kreibich, and D. Song, Dispatcher, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.621-634, 2009.
DOI : 10.1145/1653662.1653737

J. Caballero and D. Song, Rosetta: Extracting protocol semantics using binary analysis with applications to protocol replay and NAT rewriting, 2007.

J. Caballero and D. Song, Automatic protocol reverse-engineering: Message format extraction and field semantics inference, Computer Networks, vol.57, issue.2, pp.451-474
DOI : 10.1016/j.comnet.2012.08.003

J. Caballero, H. Yin, Z. Liang, and D. Song, Polyglot, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.317-329, 2007.
DOI : 10.1145/1315245.1315286

C. Bayerri and J. , Grammar and model extraction for security applications using dynamic program binary analysis, Thèse de doctorat non publiée, 2010.

C. Y. Cho, D. Babi´cbabi´c, P. Poosankam, K. Z. Chen, E. X. Wu et al., MACE: model-inference-assisted concolic exploration for protocol and vulnerability discovery, Proceedings of the 20th USENIX conference on Security, p.19, 2011.

C. Y. Cho, D. Babi´cbabi´c, E. C. Shin, and D. Song, Inference and analysis of formal models of botnet command and control protocols, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.426-439, 2010.
DOI : 10.1145/1866307.1866355

J. Chow, Understanding Data Lifetime, Thèse de doctorat non publiée, 2006.

P. Comparetti, G. Wondracek, C. Kruegel, and E. Kirda, Prospex: Protocol Specification Extraction, 2009 30th IEEE Symposium on Security and Privacy, pp.110-125, 2009.
DOI : 10.1109/SP.2009.14

W. Cui, J. Kannan, and H. J. Wang, Discoverer: automatic protocol reverse engineering from network traces, Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pp.1-14, 2007.

W. Cui, V. Paxson, N. Weaver, and R. H. Katz, Protocol-independent adaptive replay of application dialog, Proceedings of the 13th annual network and distributed system security symposium (ndss), 2006.

W. Cui, M. Peinado, K. Chen, H. J. Wang, and L. Irun-briz, Tupni, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.391-402, 2008.
DOI : 10.1145/1455770.1455820

W. Cui, M. Peinado, H. Wang, and M. Locasto, ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.252-266, 2007.
DOI : 10.1109/SP.2007.34

F. Guihery and G. Bossert, The future of protocol reversing and simulation applied on ZeroAccess, 29c3: 29th chaos communication congress '12, p.3, 2012.

F. Guihery and G. Bossert, Netzob : un outil pour la rétro-conception de protocoles de communication, Symposium sur la sécurité des technologies de l'information et de la communication, 2012.

T. Krueger, H. Gascon, N. Krämer, and K. Rieck, Learning stateful models for network honeypots, Proceedings of the 5th ACM workshop on Security and artificial intelligence, AISec '12, pp.37-48, 2012.
DOI : 10.1145/2381896.2381904

T. Krueger, N. Krämer, and K. Rieck, ASAP: Automatic Semantics-Aware Analysis of Network Payloads, Privacy and Security Issues in Data Mining and Machine Learning, pp.50-63, 2010.
DOI : 10.1145/1390334.1390387

, Outils pour la rétro-conception de protocoles 31

C. Leita, SGNET : automated protocol learning for the observation of malicious threats, Thèse de doctorat non publiée, 2008.

C. Leita, K. Mermoud, and M. Dacier, ScriptGen: an automated script generation tool for honeyd, 21st Annual Computer Security Applications Conference (ACSAC'05), pp.12-214, 2005.
DOI : 10.1109/CSAC.2005.49

X. Li and L. Chen, A Survey on Methods of Automatic Protocol Reverse Engineering, 2011 Seventh International Conference on Computational Intelligence and Security, pp.685-689, 2011.
DOI : 10.1109/CIS.2011.156

J. Lim, T. Reps, and B. Liblit, Extracting Output Formats from Executables, 2006 13th Working Conference on Reverse Engineering, pp.167-178, 2006.
DOI : 10.1109/WCRE.2006.29

Z. Lin, Reverse Engineering of Data Structures from Binary, Thèse de doctorat non publiée, 2011.

Z. Lin, X. Jiang, D. Xu, and X. Zhang, Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution, Proceedings of the 15th annual network and distributed system security symposium (ndss), 2008.

Z. Lin, X. Zhang, and D. Xu, Automatic Reverse Engineering of Data Structures from Binary Execution, Proceedings of the 17th annual network and distributed system security symposium (ndss), 2010.

J. Narayan, S. K. Shukla, and T. C. Clancy, A Survey of Automatic Protocol Reverse Engineering Tools, ACM Computing Surveys, vol.48, issue.3, p.40, 2015.
DOI : 10.1109/ICDMA.2012.125

S. B. Needleman and C. D. Wunsch, A general method applicable to the search for similarities in the amino acid sequence of two proteins, Journal of Molecular Biology, vol.48, issue.3, pp.443-453, 1970.
DOI : 10.1016/0022-2836(70)90057-4

M. Nei, F. Tajima, and Y. Tateno, Accuracy of estimated phylogenetic trees from molecular data, Journal of Molecular Evolution, vol.18, issue.2, pp.153-170, 1983.
DOI : 10.1016/B978-0-12-398560-6.50036-5

J. Newsome, D. Brumley, J. Franklin, and D. Song, Replayer, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.311-321, 2006.
DOI : 10.1145/1180405.1180444

T. Reps, G. Balakrishnan, J. Lim, and T. Teitelbaum, A Next-Generation Platform for Analyzing Executables, 3rd asian symposium on programming languages and systems, pp.212-229, 2005.

S. Team, Opening windows to a wider world, 2017.

A. Slowinska, T. Stancescu, and H. Bos, Dynamic data structure excavation, 2010.

A. Slowinska, T. Stancescu, and H. Bos, Howard: A Dynamic Excavator for Reverse Engineering Data Structures, Proceedings of the 18th annual network and distributed system security symposium (ndss), 2011.

R. Wang, X. Wang, K. Zhang, and Z. Li, Towards automatic reverse engineering of software security configurations, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.245-256, 2008.
DOI : 10.1145/1455770.1455802

Y. Wang, Z. Zhang, and L. Guo, septembre) Inferring Protocol State Machine from Real- World Trace, Recent Advances in Intrusion Detection, pp.498-499, 2010.

Y. Wang, Z. Zhang, D. D. Yao, B. Qu, and L. Guo, Inferring Protocol State Machine from Network Traces: A Probabilistic Approach, Applied Cryptography and Network Security, pp.1-18, 2011.
DOI : 10.1080/01969727408546059

Z. Wang, X. Jiang, W. Cui, X. Wang, and M. Grace, ReFormat: Automatic Reverse Engineering of Encrypted Messages, Computer Security ? ESORICS 2009, pp.200-215, 2009.
DOI : 10.1109/SP.2009.14

URL : http://www.cs.berkeley.edu/~wdc/papers/reformat-esorics09.pdf

G. Wondracek, P. M. Comparetti, C. Krügel, and E. Kirda, Automatic network protocol analysis, Proceedings of the 15th annual network and distributed system security symposium (ndss), 2008.

J. Zeng and Z. Lin, Towards Automatic Inference of Kernel Object Semantics from Binary Code, 18th International Symposium, RAID 2015, pp.538-561, 2015.
DOI : 10.1007/978-3-319-26362-5_25