“…Protocol reverse engineering targets at inferring the specification of unknown network protocols for further security evaluation [56], [63], [37], [73]. There are two main categories, either by program analysis [28], [57], [82], [33], [59], [32] or by network traces [22], [55], [35], [52], [81], [51], [80], [26], [38], [47]. Network trace methods are usually based on sequence alignment algorithms [64] or token patterns, and are limited for their low accuracy or conciseness.…”