{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:42:51Z","timestamp":1725536571716},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1109\/csmr-wcre.2014.6747196","type":"proceedings-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T21:03:45Z","timestamp":1394226225000},"page":"367-370","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight runtime reverse engineering of binary file format variants"],"prefix":"10.1109","author":[{"given":"Jeroen","family":"van den Bos","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"Rec T 81 (JPEG Compression Specification)","year":"1992","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39013-5_15"},{"key":"10","first-page":"671","article-title":"Bringing domain-Specific languages to digital forensics","author":"bos","year":"2011","journal-title":"33rd International Conference on Software Engineering (ICSE'11) ACM"},{"journal-title":"Portable network graphics (PNG) specification","year":"2003","key":"1"},{"key":"7","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1145\/1315245.1315286","article-title":"Polyglot automatic extraction of protocol message format using dynamic binary analysis","author":"caballero","year":"2007","journal-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07) ACM"},{"year":"0","key":"6"},{"key":"5","article-title":"Howard a dynamic excavator for reverse engineering data structures","author":"slowinska","year":"2011","journal-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS'11)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.931081"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190231"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455820"},{"year":"0","key":"11"}],"event":{"name":"2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering and Reverse Engineering (CSMR-WCRE)","start":{"date-parts":[[2014,2,3]]},"location":"Antwerp, Belgium","end":{"date-parts":[[2014,2,6]]}},"container-title":["2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6736725\/6747152\/06747196.pdf?arnumber=6747196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T09:13:59Z","timestamp":1498122839000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6747196\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/csmr-wcre.2014.6747196","relation":{},"subject":[],"published":{"date-parts":[[2014,2]]}}}