{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:56:32Z","timestamp":1742957792693,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030799960"},{"type":"electronic","value":"9783030799977"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-79997-7_29","type":"book-chapter","created":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T11:02:57Z","timestamp":1624705377000},"page":"232-237","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Strategies of Naive Software Reverse Engineering: A Qualitative Analysis"],"prefix":"10.1007","author":[{"given":"Salsabil","family":"Hamadache","sequence":"first","affiliation":[]},{"given":"Markus","family":"Krause","sequence":"additional","affiliation":[]},{"given":"Malte","family":"Elson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,27]]},"reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"Fyrbiak, M., et al.:. Hardware reverse engineering: overview and open challenges. In: 2017 IEEE 2nd International Verification and Security Workshop (IVSW), pp. 88\u201394. IEEE, July 2017","DOI":"10.1109\/IVSW.2017.8031550"},{"key":"29_CR2","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.3389\/fpsyg.2017.01153","volume":"8","author":"D D\u00f6rner","year":"2017","unstructured":"D\u00f6rner, D., Funke, J.: Complex problem solving: what it is and what it is not. Front. Psychol. 8, 1153 (2017)","journal-title":"Front. Psychol."},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Hendrix, D., Cross, J.H., Maghsoodloo, S.: The effectiveness of control structure diagrams in source code comprehension activities.\u00a0IEEE Trans. Softw. Eng. 28(5), 463\u2013477 (2002)","DOI":"10.1109\/TSE.2002.1000450"},{"key":"29_CR4","doi-asserted-by":"publisher","unstructured":"Schrittwieser, S., et al.: Covert computation: hiding code in code for obfuscation purposes. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 529\u2013534. ACM, May 2013. https:\/\/doi.org\/10.1145\/2484313.2484384","DOI":"10.1145\/2484313.2484384"},{"issue":"4","key":"29_CR5","first-page":"86","volume":"6","author":"J Park","year":"2015","unstructured":"Park, J., Kim, H., Jeong, Y., Cho, S.J., Ha, S., Park, M.: Effects of code obfuscation on android app similarity analysis. J. Wirel. Mob. Netw. Ubiquitous Comput. Depend. Appl. 6(4), 86\u201398 (2015)","journal-title":"J. Wirel. Mob. Netw. Ubiquitous Comput. Depend. Appl."},{"issue":"4","key":"29_CR6","doi-asserted-by":"publisher","first-page":"1040","DOI":"10.1007\/s10664-013-9248-x","volume":"19","author":"M Ceccato","year":"2013","unstructured":"Ceccato, M., Di. Penta, M., Falcarin, P., Ricca, F., Torchiano, M., Tonella, P.: A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques. Empir. Softw. Eng. 19(4), 1040\u20131074 (2013). https:\/\/doi.org\/10.1007\/s10664-013-9248-x","journal-title":"Empir. Softw. Eng."},{"key":"29_CR7","unstructured":"H\u00e4nsch, N., Schankin, A., Protsenko, M., Freiling, F., Benenson, Z.: Programming experience might not help in comprehending obfuscated source code efficiently. In: Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018), pp. 341\u2013356 (2018)"},{"key":"29_CR8","unstructured":"Bryant, A.R., Mills, R.F., Peterson, G.L., Grimaila, M.R.: Software reverse engineering as a sensemaking task.\u00a0J. Inf. Assur. Secur. 6(6) (2011)"},{"key":"29_CR9","unstructured":"Sachin, M.: Captura [computer software] (2019)"},{"key":"29_CR10","unstructured":"VERBI Software: MAXQDA 2020 [computer software], Berlin, Germany (2019)"}],"container-title":["Lecture Notes in Networks and Systems","Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-79997-7_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T11:16:05Z","timestamp":1624706165000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-79997-7_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030799960","9783030799977"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-79997-7_29","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"27 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AHFE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Human Factors and Ergonomics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ahfe2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.ahfe.org\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}