{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:48:48Z","timestamp":1755838128934,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1109\/crisis.2008.4757482","type":"proceedings-article","created":{"date-parts":[[2009,1,20]],"date-time":"2009-01-20T16:03:38Z","timestamp":1232467418000},"page":"221-225","source":"Crossref","is-referenced-by-count":1,"title":["VisAA: Visual analyzer for assembler"],"prefix":"10.1109","author":[{"given":"Philippe","family":"Andouard","sequence":"first","affiliation":[]},{"given":"Olivier","family":"Ly","sequence":"additional","affiliation":[]},{"given":"Davy","family":"Rouillard","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"17"},{"journal-title":"Formal Languages and Their Relation to Automata","year":"1969","author":"hopcroft","key":"15"},{"year":"0","key":"16"},{"journal-title":"Advanced Compiler Design and Implementation","year":"1997","author":"muchnick","key":"13"},{"journal-title":"Compilers Principles Techniques and Tools","year":"1986","author":"aho","key":"14"},{"journal-title":"Objective Caml","year":"0","key":"11"},{"key":"12","first-page":"483","article-title":"graphviz - open source graph drawing tools","author":"ellson","year":"2001","journal-title":"Graph Drawing"},{"key":"3","first-page":"167","article-title":"a practical implementation of the timing attack","author":"dhem","year":"1998","journal-title":"CARDIS"},{"key":"2","article-title":"wysinwyx: what you see is not what you execute","author":"balakrishnan","year":"2005","journal-title":"VSTTE"},{"year":"0","key":"1"},{"journal-title":"Ida pro - the interactive disassembler","year":"0","key":"10"},{"key":"7","first-page":"55","article-title":"a flexible tool for visualizing assembly code","volume":"20","author":"estep","year":"2005","journal-title":"J Comput Small Coll"},{"journal-title":"Atmel AVR 8-bit RISC","year":"0","key":"6"},{"key":"5","first-page":"192","volume":"1380","author":"hevia","year":"1998","journal-title":"Strength of two data encryption standard implementations under timing attacks"},{"journal-title":"Side channel attacks database","year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2005.1440978"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1121341.1121416"}],"event":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems( CRiSIS)","start":{"date-parts":[[2008,10,28]]},"location":"Tozeur, Tunisia","end":{"date-parts":[[2008,10,30]]}},"container-title":["2008 Third International Conference on Risks and Security of Internet and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4733895\/4757450\/04757482.pdf?arnumber=4757482","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T11:14:56Z","timestamp":1489749296000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4757482\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/crisis.2008.4757482","relation":{},"subject":[],"published":{"date-parts":[[2008,10]]}}}