{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:35:24Z","timestamp":1743050124314,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642394539"},{"type":"electronic","value":"9783642394546"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39454-6_12","type":"book-chapter","created":{"date-parts":[[2013,6,12]],"date-time":"2013-06-12T00:54:13Z","timestamp":1370998453000},"page":"113-122","source":"Crossref","is-referenced-by-count":1,"title":["Improving Tool Support for Software Reverse Engineering in a Security Context"],"prefix":"10.1007","author":[{"given":"Brendan","family":"Cleary","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Treude","sequence":"additional","affiliation":[]},{"given":"Fernando Figueira","family":"Filho","sequence":"additional","affiliation":[]},{"given":"Margaret-Anne","family":"Storey","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Salois","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/s12117-008-9038-9","volume":"11","author":"K.K. Choo","year":"2008","unstructured":"Choo, K.K.: Organised crime groups in cyberspace: a typology. Trends in Organized Crime\u00a011, 270\u2013295 (2008)","journal-title":"Trends in Organized Crime"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Cleary, B., Painchaud, F., Chan, L., Storey, M.A., Salois, M.: Atlantis - assembly trace analysis environment. In: IEEE 19th Working Conference on Reverse Engineering, WCRE 2012 (2012)","DOI":"10.1109\/WCRE.2012.62"},{"issue":"1","key":"12_CR3","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/0167-4048(87)90122-2","volume":"6","author":"F. Cohen","year":"1987","unstructured":"Cohen, F.: Computer viruses: Theory and experiments. Computers & Security\u00a06(1), 22\u201335 (1987)","journal-title":"Computers & Security"},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1145\/214427.214431","volume":"4","author":"E.M. Gerson","year":"1986","unstructured":"Gerson, E.M., Star, S.L.: Analyzing due process in the workplace. ACM Transactions on Information Systems\u00a04, 257\u2013270 (1986)","journal-title":"ACM Transactions on Information Systems"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Luk, C.K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood, K.: Pin: building customized program analysis tools with dynamic instrumentation. In: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2005, pp. 190\u2013200 (2005)","DOI":"10.1145\/1064978.1065034"},{"key":"12_CR6","unstructured":"Peterson, T.F.: A History of Hacks and Pranks at MIT. The MIT Press (2011)"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Song, D., Brumley, D., Caballero, J., Jager, I., Kang, M.G., Liang, Z., Newsome, J., Poosankam, P., Saxena, P.: Bitblaze: A new approach to computer security via binary analysis. In: Proceedings of the 4th International Conference on Information Systems Security (2008)","DOI":"10.1007\/978-3-540-89862-7_1"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Storey, M.A., Ryall, J., Singer, J., Myers, D., Cheng, L.-T., Muller, M.: How software developers use tagging to support reminding and refinding. IEEE Transactions on Software Engineering\u00a043 (2009)","DOI":"10.1109\/TSE.2009.15"},{"key":"12_CR9","unstructured":"Sutton, M., Greene, A., Amin, P.: Fuzzing: Brute Force Vulnerability Discovery. Addison-Wesley (2007)"},{"key":"12_CR10","unstructured":"Symantec: Internet security threat report, vol. 17 (April 2012), \n                    \n                      http:\/\/bit.ly\/15nJXO7\n                    \n                    \n                   (last access: January 3, 2012)"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Treude, C., Figueira Filho, F., Storey, M.A., Salois, M.: An exploratory study of software reverse engineering in a security context. In: 18th Working Conference on Reverse Engineering (WCRE 2011), pp. 184\u2013188 (2011)","DOI":"10.1109\/WCRE.2011.30"}],"container-title":["Lecture Notes in Computer Science","Foundations of Augmented Cognition"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39454-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T22:48:27Z","timestamp":1582411707000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39454-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642394539","9783642394546"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39454-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}