{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T10:19:33Z","timestamp":1776334773314,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540859314","type":"print"},{"value":"9783540859338","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85933-8_1","type":"book-chapter","created":{"date-parts":[[2008,9,14]],"date-time":"2008-09-14T05:44:51Z","timestamp":1221371091000},"page":"1-17","source":"Crossref","is-referenced-by-count":57,"title":["Visual Reverse Engineering of Binary and Data Files"],"prefix":"10.1007","author":[{"given":"Gregory","family":"Conti","sequence":"first","affiliation":[]},{"given":"Erik","family":"Dean","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Sinda","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Sangster","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Conti, G., Grizzard, J., Ahamad, M., Owen, H.: Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries. In: IEEE Symposium on Information Visualization\u2019s Workshop on Visualization for Computer Security (VizSEC) (October 2005)"},{"issue":"1","key":"1_CR2","first-page":"31","volume":"2","author":"J. Helfman","year":"1995","unstructured":"Helfman, J.: Dotplot Patterns: A Literal Look at Pattern Languages. TAPOS Journal\u00a02(1), 31\u201341 (1995)","journal-title":"TAPOS Journal"},{"key":"1_CR3","unstructured":"Kaminsky, D.: Black Ops 2006. Blackhat USA (2006) (last accessed December 20, 2007), www.doxpara.com\/slides\/dmk_blackops2006.ppt"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Yoo, I.: Visualizing Windows Executable Viruses Using Self-Organizing Maps. VizSec\/DMSec (2004)","DOI":"10.1145\/1029208.1029222"},{"key":"1_CR5","unstructured":"Carrera, E., Erdelyi, G.: Digital Genome Mapping \u2013 Advanced Binary Malware Analysis. In: Virus Bulletin Conference (2004)"},{"key":"1_CR6","unstructured":"Flake., H.: Structural Comparison of Executable Objects. Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), pp. 161\u2013173 (2004)"},{"key":"1_CR7","unstructured":"A different look at Bagle. F-Secure Weblog (23 September 2005) (last accessed December 20, 2007), http:\/\/www.f-secure.com\/weblog\/archives\/00000662.html"},{"key":"1_CR8","unstructured":"Graphing malware. F-Secure Weblog (25 October 2005) (last accessed December 20, 2007), http:\/\/www.f-secure.com\/weblog\/archives\/00000324.html"},{"key":"1_CR9","unstructured":"Dullien, T., Rolles, R.: Graph-based comparison of Executable Objects. In: Symposium Sur La Securite Des Technologies De L\u2019Information Et Des Communications (SSTIC) (2005)"},{"key":"1_CR10","unstructured":"Flake, H.: Diff, Navigate, Audit \u2013 Three applications of graphs and graphing for security, Blackhat USA (2004) (last accessed December 20, 2007), http:\/\/www.blackhat.com\/presentations\/bh-usa-04\/bh-us-04-flake.pdf"},{"key":"1_CR11","unstructured":"Nolan, B., Sinda, M.: File Visualization Environment (FiVE). In: National Conference on Undergraduate Research (2008)"},{"key":"1_CR12","unstructured":"Kaminsky, D.: Black Ops 2006 : Viz Edition. Chaos Computer Congress (2006) (last accessed May 1, 2008), www.doxpara.com\/slides\/dmk_blackops2006_ccc.ppt"},{"key":"1_CR13","volume-title":"Fuzzing: Brute Force Vulnerability Discovery","author":"M. Sutton","year":"2007","unstructured":"Sutton, M., Greene, A., Amini, P.: Fuzzing: Brute Force Vulnerability Discovery. Addison-Wesley, Reading (2007)"}],"container-title":["Lecture Notes in Computer Science","Visualization for Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85933-8_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:36:26Z","timestamp":1606185386000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85933-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540859314","9783540859338"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85933-8_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[]}}