{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:08:41Z","timestamp":1729634921522,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/wcre.2013.6671279","type":"proceedings-article","created":{"date-parts":[[2013,12,3]],"date-time":"2013-12-03T22:00:42Z","timestamp":1386108042000},"page":"42-51","source":"Crossref","is-referenced-by-count":1,"title":["Reconstructing program memory state from multi-gigabyte instruction traces to support interactive analysis"],"prefix":"10.1109","author":[{"given":"Brendan","family":"Cleary","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Patrick","family":"Gorman","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Eric","family":"Verbeek","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Margaret-Anne","family":"Storey","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Martin","family":"Salois","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Frederic","family":"Painchaud","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1879211.1879221"},{"key":"22","first-page":"184","author":"treude","year":"2011","journal-title":"An Exploratory Study of Software Reverse Engineering in A Security Context"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2009.169"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1879211.1879232"},{"key":"18","first-page":"558","author":"pothier","year":"2011","journal-title":"Summarized Trace Indexing and Querying for Scalable Back-in-time Debugging"},{"journal-title":"Microsoft !Exploitable Crash Analyzer-Msec Debugger Extensions","year":"0","key":"15"},{"journal-title":"Usability Engineering","year":"1994","author":"nielsen","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/949352.949367"},{"key":"14","first-page":"36","article-title":"Debugging applications with intellitrace","author":"marks","year":"2010","journal-title":"MSDN Magazine"},{"journal-title":"Intel Pin-A Dynamic Binary Instrumentation Tool","year":"0","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151044"},{"journal-title":"Fuzzing Brute Force Vulnerability Discovery","year":"2007","author":"sutton","key":"21"},{"key":"3","first-page":"815","article-title":"Parker. Interactive visualization for memory reference traces","author":"imroz choudhury","year":"2008","journal-title":"Proceedings of the 10th Joint Eurographics \/ IEEE-VGTC Conference on Visualization EuroVis08"},{"key":"20","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-89862-7_1","article-title":"BitBlaze: A new approach to computer security via binary analysis","author":"song","year":"2008","journal-title":"Proceedings of the 4th International Conference on Information Systems Security Keynote Invited Paper"},{"key":"2","first-page":"463","author":"brumley","year":"2011","journal-title":"Bap A Binary Analysis Platform"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1879211.1879222"},{"journal-title":"HexRays IDA Pro The Trace Replayer","year":"0","key":"10"},{"journal-title":"Dominic Fischer and Daniel Jordi Malfare Plugin for IDA Pro","year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1879211.1879233"},{"key":"5","first-page":"505","volume":"0","author":"cleary","year":"2012","journal-title":"Atlantis-Assembly Trace Analysis Environment Reverse Engineering Working Conference on"},{"key":"4","first-page":"22","article-title":"Understanding data lifetime via whole system simulation","volume":"13","author":"chow","year":"2004","journal-title":"Proceedings of the 13th conference on USENIX Security Symposium"},{"journal-title":"Toms Hardware 2012 Ssd Benchmarks","year":"0","key":"9"},{"journal-title":"GNU Gdb The Gnu Project Debugger","year":"0","key":"8"}],"event":{"name":"2013 20th Working Conference on Reverse Engineering (WCRE)","start":{"date-parts":[[2013,10,14]]},"location":"Koblenz, Germany","end":{"date-parts":[[2013,10,17]]}},"container-title":["2013 20th Working Conference on Reverse Engineering (WCRE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6656028\/6671267\/06671279.pdf?arnumber=6671279","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,18]],"date-time":"2022-03-18T15:30:59Z","timestamp":1647617459000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6671279\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/wcre.2013.6671279","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}