{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:57:49Z","timestamp":1757311069584},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041167"},{"type":"electronic","value":"9783642041174"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-04117-4_31","type":"book-chapter","created":{"date-parts":[[2010,2,22]],"date-time":"2010-02-22T11:44:00Z","timestamp":1266839040000},"page":"659-696","source":"Crossref","is-referenced-by-count":7,"title":["Software Reverse Engineering"],"prefix":"10.1007","author":[{"given":"Teodoro","family":"Cipresso","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mark","family":"Stamp","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"H.A.\u00a0M\u00fcller, J.H.\u00a0Jahnke, D.B.\u00a0Smith, M.\u00a0Storey, S.R.\u00a0Tilley, K.\u00a0Wong: Reverse engineering: A\u00a0roadmap, Proc. Conference on the Future of Software Engineering, Limerick (2000) pp. 47\u201360","DOI":"10.1145\/336512.336526"},{"key":"31_CR2","unstructured":"G.\u00a0Canfora, M.\u00a0Di Penta: New Frontiers of Reverse Engineering, Proc. Future of Software Engineering, Minneapolis (2007) pp. 326\u2013341"},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"M.R.\u00a0Ali: Why teach reverse engineering?, ACM SIGSOFT SEN 30(4), 1\u20134 (2005)","DOI":"10.1145\/1082983.1083004"},{"key":"31_CR4","unstructured":"L. Cunningham: COBOL Reborn (Jul. 9, 2008) [Online], available: \n                  http:\/\/it.toolbox.com\/blogs\/oracle-guide\/cobol-reborn-25896\n                  \n                 (last accessed: Jan. 30th, 2009)"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"A.V.\u00a0Deursen, J.\u00a0Favre, R.\u00a0Koschke, J.\u00a0Rilling: Experiences in Teaching Software Evolution and Program Comprehension, Proc. 11th IEEE Int. Workshop on Program Comprehension, Washington, DC (2003) pp. 2834\u2013284","DOI":"10.1109\/WPC.2003.1199214"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"B.W.\u00a0Weide, W.D.\u00a0Heym, J.E.\u00a0Hollingsworth: Reverse engineering of legacy code exposed, Proc. 17th Int. Conference on Software Engineering, Seattle (1995) pp. 327\u2013331","DOI":"10.1145\/225014.225045"},{"key":"31_CR7","volume-title":"Secrets of Reverse Engineering","author":"E. Eliam","year":"2005","unstructured":"E.\u00a0Eliam: Secrets of Reverse Engineering (Wiley, Indianapolis 2005)"},{"key":"31_CR8","unstructured":"Wikipedia contributors: Compiler, Wikipedia, The Free Encyclopedia (Sep. 9th, 2008) [Online], available: \n                  http:\/\/en.wikipedia.org\/w\/index.php?title=Compiler&oldid=237244781\n                  \n                 (last accessed: Sep. 14th, 2008)"},{"key":"31_CR9","volume-title":"An introduction to GCC for the GNU Compilers gcc and g++","author":"B. Gough","year":"2005","unstructured":"B.\u00a0Gough: An introduction to GCC for the GNU Compilers gcc and g++ (Network Theory, Bristol 2005)"},{"key":"31_CR10","volume-title":"Assembly Language: For Intel-Based Computers","author":"K. Irvine","year":"2007","unstructured":"K.\u00a0Irvine: Assembly Language: For Intel-Based Computers (Prentice Hall, Upper Saddle River 2007)"},{"key":"31_CR11","unstructured":"Boomerang Decompiler Project: Boomerang: A\u00a0general, open source, retargetable decompiler of machine code programs [Online], Available: \n                  http:\/\/boomerang.sourceforge.net\n                  \n                 (last accessed: Jul. 4th, 2008)"},{"key":"31_CR12","unstructured":"Backer Street Software: REC v2.1: Reverse Engineering Compiler [Online], available: \n                  http:\/\/www.backerstreet.com\/rec\/rec.htm\n                  \n                 (last accessed: Sep. 15th, 2008)"},{"key":"31_CR13","unstructured":"Crypto++\u00ae Library 5.5.2: Crypto++ Library is a free C++ class library of cryptographic schemes [Online], available: \n                  http:\/\/www.cryptopp.com\n                  \n                 (last accessed: Jun. 15th, 2008)"},{"key":"31_CR14","unstructured":"O. Yuschuk: OllyDbg v1.1: 32-bit assembler level analysing debugger for Microsoft Windows\u00ae [Online], available: \n                  http:\/\/www.ollydbg.de\n                  \n                 (last accessed: Feb. 8th, 2008)"},{"key":"31_CR15","unstructured":"Wikipedia contributors: Machine code, Wikipedia, The Free Encyclopedia (Oct. 21st, 2008) [Online], available: \n                  http:\/\/en.wikipedia.org\/w\/index.php?title=Machine_code&oldid=246690032\n                  \n                 (accessed: Nov. 1st, 2008)"},{"key":"31_CR16","unstructured":"P. Haggar: Java bytecode: Understanding bytecode makes you a better programmer, developerWorks (Jul. 1st, 2001) [Online], available: \n                  http:\/\/www.ibm.com\/developerworks\/ibm\/library\/it-haggar_bytecode\/\n                  \n                 (last accessed: Nov. 1st, 2008)"},{"key":"31_CR17","unstructured":"P. Kouznetsov: Jad v1.5.8g: Jad is a Java decompiler, i.e. program that reads one or more Java class files and converts them into Java source files which can be compiled again [Online], available: \n                  http:\/\/www.kpdus.com\/jad.html\n                  \n                 (last accessed: Jun. 15th, 2008)"},{"key":"31_CR18","volume-title":"The Psychology of Computer Programming","author":"G.M. Weinberg","year":"1998","unstructured":"G.M.\u00a0Weinberg: The Psychology of Computer Programming (Dorset House Publishing, New York 1998)"},{"key":"31_CR19","volume-title":"Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering","author":"A. Kalinovsky","year":"2004","unstructured":"A.\u00a0Kalinovsky: Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering (Sam\u2019s Publishing, Indianapolis 2004)"},{"key":"31_CR20","volume-title":"Elementary Cryptanalysis: A Mathematical Approach","author":"A. Sinkov","year":"1980","unstructured":"A.\u00a0Sinkov: Elementary Cryptanalysis: A Mathematical Approach (The Mathematical Association of America, Washington 1980)"},{"key":"31_CR21","volume-title":"Information Security: Principles and Practice","author":"M. Stamp","year":"2006","unstructured":"M.\u00a0Stamp: Information Security: Principles and Practice (Wiley, Hoboken 2006)"},{"key":"31_CR22","unstructured":"Wikipedia contributors: ROT13, Wikipedia, The Free Encyclopedia (Feb. 9th, 2009) [Online], availble: \n                  http:\/\/en.wikipedia.org\/w\/index.php?title=ROT13&oldid=269492700\n                  \n                 (last accessed: Feb. 17th, 2009)"},{"key":"31_CR23","unstructured":"B. Baier: COBF v1.06: the Freeware C\/C++ Sourcecode Obfuscator [Online], available: \n                  http:\/\/home.arcor.de\/bernhard.baier\/cobf\n                  \n                 (last accessed: Jun. 16th, 2008)"},{"issue":"4","key":"31_CR24","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TSE.1976.233837","volume":"2","author":"T.J. McCabe","year":"1976","unstructured":"T.J.\u00a0McCabe: A complexity measure, IEEE Trans. Softw. Eng. 2(4), 308\u2013320 (1976), Online, available: \n                  http:\/\/www.literateprogramming.com\/mccabe.pdf\n                  \n                 (last accessed: Mar. 2nd, 2009)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"31_CR25","unstructured":"Wikipedia contributors: Levenshtein distance, Wikipedia, The Free Encyclopedia (Sep.\u00a026th, 2008) [Online], available: \n                  http:\/\/en.wikipedia.org\/w\/index.php?title=Levenshtein_distance&oldid=273450805\n                  \n                 (last accessed: Mar. 4th, 2009)"},{"key":"31_CR26","unstructured":"The University of Arizona, Department of Computer Science: SandMark: A Tool for the Study of Software Protection Algorithms [Online], available: \n                  http:\/\/sandmark.cs.arizona.edu\n                  \n                 (last accessed: Mar. 26th, 2008)"},{"key":"31_CR27","unstructured":"E. Lafortune: ProGuard v4.3: a Free Java bytecode Shrinker, Optimizer, Obfuscator, and Preverifier [Online], available: \n                  http:\/\/proguard.sourceforge.net\n                  \n                 (last accessed: Jan. 7th, 2009)"},{"key":"31_CR28","unstructured":"Retrologic Systems: RetroGuard v2.3.1 for Java Obfuscation [Online], available: \n                  http:\/\/www.retrologic.com\/retroguard-main.html\n                  \n                 (last accessed: Jan. 7th, 2009)"},{"key":"31_CR29","unstructured":"Zelix Pty Ltd: Zelix Klassmaster: Java Bytecode Obfuscator [Online], available: \n                  http:\/\/www.zelix.com\/klassmaster\/features.html\n                  \n                 (last accessed: Jan. 25th, 2009)"},{"key":"31_CR30","unstructured":"A. G. Shvets: CafeBabe v1.2.7.a: Graphical Classfile Disassembler, Editor, Stripper, Migrator, Compactor and Obfuscator [Online], available: \n                  http:\/\/www.geocities.com\/CapeCanaveral\/Hall\/2334\/programs.html\n                  \n                 (last accessed: Jan. 15th, 2009)"},{"key":"31_CR31","unstructured":"M.R.\u00a0Batchelder: Java Bytecode Obfuscation, M.S. Thesis (Dept. Comp Sci., McGill Univ., Montreal 2007) [Online], available: \n                  http:\/\/digitool.library.mcgill.ca:1801\/webclient\/StreamGate?folder_id=0&dvs=1236657408333\u00a0988\n                  \n                 (last accessed: Mar. 3rd, 2009)"}],"container-title":["Handbook of Information and Communication Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04117-4_31.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T06:57:26Z","timestamp":1619765846000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04117-4_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642041167","9783642041174"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04117-4_31","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}