The protocol reverse engineering project includes a set of tools developed for automatically reverse engineering formats of network messages or files. Tupni was integrated into SecuTest, a fuzz testing tool developed and owned by Windows Serviceability (part of the Windows divison in Micorosoft).
- Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang, and Mike Grace, ReFormat: Automatic Reverse Engineering of Encrypted Messages, in Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS), September 2009.
- Weidong Cui, Marcus Peinado, Karl Chen, Helen J. Wang, and Luis Irun-Briz, Tupni: Automatic Reverse Engineering of Input Formats, in Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS), Association for Computing Machinery, Inc., 27 October 2008.
- Weidong Cui, Jayanthkumar Kannan, and Helen J. Wang, Discoverer: Automatic Protocol Reverse Engineering from Network Traces, in Proceedings of the 16th USENIX Security Symposium, August 2007.
- Weidong Cui, Vern Paxson, Nicholas Weaver, and Randy H. Katz, Protocol-Independent Adaptive Replay of Application Dialog, in Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS), February 2006.