Given a sequence of some autonomous behavior,
this sequence can be computed as the output of a linear system.
If one receives a highly noisy sequence correlated with such a
linear sequence, the problem we study is how to obtain the input
of the linear system. We explain known correlation attacks in
this general setting and we show types of autonomous behaviors
which should be avoided.