applications. Hidden Markov models (HMMs) have used timing data to extract passwords
from cryptographically protected communications tunnels. We extend that work to show how
HMM models of protocols can be extracted directly from observations of protocol timing
artifacts with no a priori knowledge. Since our approach uses symbolic reasoning, an
important question is how to best translate continuous data observations to symbolic data …