{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:55:30Z","timestamp":1726037730722},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242671"},{"type":"electronic","value":"9783030242688"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24268-8_22","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:03:34Z","timestamp":1563390214000},"page":"235-245","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Survey of Software Reverse Engineering Applications"],"prefix":"10.1007","author":[{"given":"Zhuangyou","family":"Chen","sequence":"first","affiliation":[]},{"given":"Bing","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Yanbin","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"22_CR1","unstructured":"Ge, X., Prywes, N.: Reverse software engineering of concurrent programs. In: 1990 Proceedings of the 5th Jerusalem Conference on Information Technology, Next Decade in Information Technology, 22\u201325 October 1990. IEEE (1990)"},{"key":"22_CR2","unstructured":"Beijing Ruixing Information Technology Co., Ltd., National Information Center Information and Network Security Department, China Network complete report for the first half of 2017. \n                      http:\/\/www.sic.gov.cn\/archiver\/SIC\/UpFile\/Files\/Default\/20170807115920801889.pdf"},{"key":"22_CR3","unstructured":"WCRE. Computer Science bibliography. Archived from the original on 14 March 2017. \n                      http:\/\/dblp.uni-trier.de\n                      \n                    . Accessed 22 Feb 2018"},{"key":"22_CR4","isbn-type":"print","volume-title":"Reversing: Secrets of Reverse Engineering","author":"E Eilam","year":"2005","unstructured":"Eilam, E.: Reversing: Secrets of Reverse Engineering. Wiley, Hoboken (2005). ISBN 978-0-7645-7481-8","ISBN":"http:\/\/id.crossref.org\/isbn\/9780764574818"},{"key":"22_CR5","unstructured":"Supreme People\u2019s Court (SPC). Interpretation of the Supreme People\u2019s Court on Some Issues Concerning the Application of Law in the Trial of Civil Cases Involving Unfair Competition Article 12 (2007)"},{"key":"22_CR6","unstructured":"Yang, S.: Research on recovering early aspects in aspect-oriented software reserve engineering. In: ICCASM 2010, Taiyuan, China. IEEE (2010)"},{"key":"22_CR7","unstructured":"Nazarlou, M.M.: Deliberate software protection technologies. In: ICIS. IEEE (2011)"},{"key":"22_CR8","unstructured":"Wagner, D.: Static analysis and computer security: new technique for software assurance. Ph.D. dissertation, pp. 29\u201352, Fall (2000)"},{"issue":"2","key":"22_CR9","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/j.infsof.2008.05.008","volume":"51","author":"Wes Masri","year":"2009","unstructured":"Masri, W., Podgurski, A.: Algorithms and tool support for dynamic information flow analysis, 385\u2013404 (2009). \n                      https:\/\/doi.org\/10.1016\/j.infsof.2008.05.008","journal-title":"Information and Software Technology"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Xuan, J., Monperrus, M.: Test case purification for improving fault localization. In: 22nd ACM SIGSOFT International Symposium on the Foundations of Software Engineering, FSE 2014, November 2014","DOI":"10.1145\/2635868.2635906"},{"key":"22_CR11","unstructured":"Yunschuk, O.: OllyDbg: 32-bit assembler level analysing debugger for Microsoft\u00ae Windows\u00ae (version 2.01) [EB\/OL], 05 Feb 2014. \n                      http:\/\/ollydbg.de\/"},{"key":"22_CR12","unstructured":"Pigoski, T.: Software maintenance (PDF), Chapter 6. In: SWEBOK. IEEE. Accessed 05 Nov 2012"},{"key":"22_CR13","unstructured":"Wu, X., Murray, A., Storey, M., Lintern, R.: A reverse engineering approach to support software maintenance: version control knowledge extraction. In: 11th Working Conference on Reverse Engineering, 8\u201312 November 2004. IEEE (2004)"},{"issue":"2","key":"22_CR14","first-page":"199","volume":"56","author":"L Chen","year":"2018","unstructured":"Chen, L., Yang, C., Liu, F., Gong, D., Ding, S.: Automatic mining of security-sensitive functions from source code. CMC: Comput. Mater. Continua 56(2), 199\u2013210 (2018)","journal-title":"CMC: Comput. Mater. Continua"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Aggarwal, A., Jalote, P.: Integrating static and dynamic analysis for detecting vulnerabilities. In: COMPSAC (2006)","DOI":"10.1109\/COMPSAC.2006.55"},{"key":"22_CR16","unstructured":"Leek, L.R., Baker, G.Z., Brown, R.E., Zhivich, M.A., Lippmann. R.P.: Coverage maximization using dynamic taint tracing. Technique report (2006)"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Burji, S., Liszka, K.J., Chan, C.: Malware analysis using reverse engineering and data mining tools. In: Proceedings of 2010 International Conference on System Science and Engineering (ICSSE), pp. 619\u2013624. IEEE Computer Society, Washington DC (2010)","DOI":"10.1109\/ICSSE.2010.5551719"},{"issue":"1","key":"22_CR18","first-page":"001","volume":"55","author":"R Meng","year":"2018","unstructured":"Meng, R., Rice, S.G., Wang, J., Sun, X.: A fusion steganographic algorithm based on faster R-CNN. CMC: Comput. Mater. Continua 55(1), 001\u2013016 (2018)","journal-title":"CMC: Comput. Mater. Continua"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Honig, A., Sikorski, M.: Practical Malware Analysis. No Starch Press, San Francisco (2012). ISBN 9781593272906","DOI":"10.1016\/S1353-4858(12)70109-5"},{"issue":"5","key":"22_CR20","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1631\/FITEE.1601745","volume":"19","author":"Bo Yu","year":"2018","unstructured":"Yu, B., Fang, Y., Yang, Q., Tang, Y., Liu, L.: A survey of malware behavior description and analysis, 584\u2013590 (2018). \n                      https:\/\/doi.org\/10.1631\/FITEE.1601745","journal-title":"Frontiers of Information Technology & Electronic Engineering"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24268-8_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:10:50Z","timestamp":1563390650000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24268-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242671","9783030242688"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24268-8_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}