{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:51:24Z","timestamp":1755838284508,"version":"3.41.0"},"reference-count":15,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T00:00:00Z","timestamp":1330560000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Inroads"],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1145\/2077808.2077826","type":"journal-article","created":{"date-parts":[[2012,10,15]],"date-time":"2012-10-15T19:22:23Z","timestamp":1350328943000},"page":"56-61","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Reverse engineering"],"prefix":"10.1145","volume":"3","author":[{"given":"William","family":"Mahoney","sequence":"first","affiliation":[{"name":"University of Nebraska at Omaha, Omaha, Nebraska"}]},{"given":"Robin A.","family":"Gandhi","sequence":"additional","affiliation":[{"name":"University of Nebraska at Omaha, Omaha, Nebraska"}]}],"member":"320","published-online":{"date-parts":[[2012,3]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083004"},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the 11th International Design Conference DESIGN 2010, 1249--1258 The Design Society","author":"Calderon M. L.","year":"2010","unstructured":"Calderon , M. L. , \"Application of Reverse Engineering Activities in the Teaching of Engineering Design \", Proceedings of the 11th International Design Conference DESIGN 2010, 1249--1258 The Design Society , 2010 . Calderon, M. L., \"Application of Reverse Engineering Activities in the Teaching of Engineering Design\", Proceedings of the 11th International Design Conference DESIGN 2010, 1249--1258 The Design Society, 2010."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2007.35"},{"volume-title":"CSET'09 Proceedings of the 2nd conference on Cyber security experimentation and test, USENIX Association Berkeley, CA","year":"2009","key":"e_1_2_1_4_1","unstructured":"Richard III, Golden G., \"A Highly Immersive Approach to Teaching Reverse Engineering\" , CSET'09 Proceedings of the 2nd conference on Cyber security experimentation and test, USENIX Association Berkeley, CA , 2009 . Richard III, Golden G., \"A Highly Immersive Approach to Teaching Reverse Engineering\", CSET'09 Proceedings of the 2nd conference on Cyber security experimentation and test, USENIX Association Berkeley, CA, 2009."},{"key":"e_1_2_1_5_1","unstructured":"http:\/\/blog.nektra.com\/main\/2009\/02\/18\/deviare-message-spy\/  http:\/\/blog.nektra.com\/main\/2009\/02\/18\/deviare-message-spy\/"},{"key":"e_1_2_1_6_1","unstructured":"http:\/\/www.acm.org\/\/education\/curricula\/ComputerScience2008.pdf  http:\/\/www.acm.org\/\/education\/curricula\/ComputerScience2008.pdf"},{"key":"e_1_2_1_7_1","unstructured":"http:\/\/www.eclipse.org\/  http:\/\/www.eclipse.org\/"},{"key":"e_1_2_1_8_1","unstructured":"http:\/\/www.heaventools.com\/overview.htm  http:\/\/www.heaventools.com\/overview.htm"},{"key":"e_1_2_1_9_1","unstructured":"http:\/\/www.hex-rays.com\/idapro\/  http:\/\/www.hex-rays.com\/idapro\/"},{"key":"e_1_2_1_10_1","unstructured":"http:\/\/www.infosecinstitute.com\/courses\/reverse_engineering_training.html  http:\/\/www.infosecinstitute.com\/courses\/reverse_engineering_training.html"},{"key":"e_1_2_1_11_1","unstructured":"http:\/\/www.ollydbg.de\/version2.html  http:\/\/www.ollydbg.de\/version2.html"},{"key":"e_1_2_1_12_1","unstructured":"http:\/\/www.putty.org\/  http:\/\/www.putty.org\/"},{"key":"e_1_2_1_13_1","unstructured":"http:\/\/www.smidgeonsoft.prohosting.com\/pebrowse-pro-file-viewer.html  http:\/\/www.smidgeonsoft.prohosting.com\/pebrowse-pro-file-viewer.html"},{"key":"e_1_2_1_14_1","unstructured":"http:\/\/www.sonsivri.com\/forum\/index.php?topic=11440.0  http:\/\/www.sonsivri.com\/forum\/index.php?topic=11440.0"},{"key":"e_1_2_1_15_1","unstructured":"http:\/\/www.woodmann.net\/RCE-CD-SITES\/Quantico\/crackme'.htm  http:\/\/www.woodmann.net\/RCE-CD-SITES\/Quantico\/crackme'.htm"}],"container-title":["ACM Inroads"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2077808.2077826","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2077808.2077826","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:15Z","timestamp":1750241175000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2077808.2077826"}},"subtitle":["<i>is it art?<\/i>"],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":15,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,3]]}},"alternative-id":["10.1145\/2077808.2077826"],"URL":"https:\/\/doi.org\/10.1145\/2077808.2077826","relation":{},"ISSN":["2153-2184","2153-2192"],"issn-type":[{"type":"print","value":"2153-2184"},{"type":"electronic","value":"2153-2192"}],"subject":[],"published":{"date-parts":[[2012,3]]},"assertion":[{"value":"2012-03-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}