{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:09:09Z","timestamp":1755839349653,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T00:00:00Z","timestamp":1657152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ONR","award":["AWD-000503"],"award-info":[{"award-number":["AWD-000503"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,7]]},"DOI":"10.1145\/3502718.3524744","type":"proceedings-article","created":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T10:28:30Z","timestamp":1657189710000},"page":"442-448","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Toward an Automatic Exploit Generation Competition for an Undergraduate Binary Reverse Engineering Course"],"prefix":"10.1145","author":[{"given":"TJ","family":"OConnor","sequence":"first","affiliation":[{"name":"Florida Institute of Technology, Melbourne, FL, USA"}]},{"given":"Carl","family":"Mann","sequence":"additional","affiliation":[{"name":"Florida Institute of Technology, Melbourne, FL, USA"}]},{"given":"Tiffanie","family":"Petersen","sequence":"additional","affiliation":[{"name":"Florida Institute of Technology, Melbourne, FL, USA"}]},{"given":"Isaiah","family":"Thomas","sequence":"additional","affiliation":[{"name":"Florida Institute of Technology, Melbourne, FL, USA"}]},{"given":"Chris","family":"Stricklan","sequence":"additional","affiliation":[{"name":"Florida Institute of Technology, Melbourne, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,7,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Phrack: Smashing the stack for fun and profit","author":"One Aleph","year":"1996","unstructured":"Aleph One . 1996 . Phrack: Smashing the stack for fun and profit . http:\/\/www.phrack.com\/issues\/49\/14.html Aleph One. 1996. Phrack: Smashing the stack for fun and profit. http:\/\/www.phrack.com\/issues\/49\/14.html"},{"key":"e_1_3_2_1_2_1","unstructured":"Arm Limited. 2020. Arm Architecture Reference Manual Armv8. https:\/\/developer.arm.com\/documentation\/ddi0487\/gb\/ Arm Limited. 2020. Arm Architecture Reference Manual Armv8. https:\/\/developer.arm.com\/documentation\/ddi0487\/gb\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.1870873"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3197091.3197111"},{"issue":"3","key":"e_1_3_2_1_5_1","article-title":"Can gamification improve the benefits of student response systems in learning? An experimental study","volume":"4","author":"Barrio C\u00e9sar Morillas","year":"2015","unstructured":"C\u00e9sar Morillas Barrio , Mario Mu noz- Organero , and Joaqu'in S\u00e1nchez Soriano . 2015 . Can gamification improve the benefits of student response systems in learning? An experimental study . In IEEE Transactions on Emerging Topics in Computing , Vol. 4 . 3 . IEEE, Piscataway, NJ, 429--438. C\u00e9sar Morillas Barrio, Mario Mu noz-Organero, and Joaqu'in S\u00e1nchez Soriano. 2015. Can gamification improve the benefits of student response systems in learning? An experimental study. In IEEE Transactions on Emerging Topics in Computing, Vol. 4.3. IEEE, Piscataway, NJ, 429--438.","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"e_1_3_2_1_6_1","unstructured":"Binary Ninja. 2021 a. Using Plugins. https:\/\/docs.binary.ninja\/guide\/plugins.html Binary Ninja. 2021 a. Using Plugins. https:\/\/docs.binary.ninja\/guide\/plugins.html"},{"key":"e_1_3_2_1_7_1","unstructured":"Binary Ninja. 2021 b. Binary Ninja Documentation: Working with Types Structures and Symbols. https:\/\/docs.binary.ninja\/guide\/type.html Binary Ninja. 2021 b. Binary Ninja Documentation: Working with Types Structures and Symbols. https:\/\/docs.binary.ninja\/guide\/type.html"},{"key":"e_1_3_2_1_8_1","unstructured":"Tim Blazytko. 2021. Automation in Reverse Engineering: String Decryption. https:\/\/synthesis.to\/2021\/06\/30\/automating_string_decryption.html Tim Blazytko. 2021. Automation in Reverse Engineering: String Decryption. https:\/\/synthesis.to\/2021\/06\/30\/automating_string_decryption.html"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.101"},{"key":"e_1_3_2_1_10_1","unstructured":"Logan Brown Gavin Hayes and Tejas Rao. 2017. Reinventing Bomblab. Reinventing Bomblab. https:\/\/digital.wpi.edu\/downloads\/s7526g02j Logan Brown Gavin Hayes and Tejas Rao. 2017. Reinventing Bomblab. Reinventing Bomblab. https:\/\/digital.wpi.edu\/downloads\/s7526g02j"},{"key":"e_1_3_2_1_11_1","volume-title":"Analysis and Exercises for Engaging Beginners in Online CTF Competitions for Security Education. In 2017 USENIX Workshop on Advances in Security Education (ASE 17)","author":"Burns Tanner J","year":"2017","unstructured":"Tanner J Burns , Samuel C Rios , Thomas K Jordan , Qijun Gu , and Trevor Underwood . 2017 . Analysis and Exercises for Engaging Beginners in Online CTF Competitions for Security Education. In 2017 USENIX Workshop on Advances in Security Education (ASE 17) . USENIX, Vancouver, BC, Canada, bibinfonumpages9 pages. Tanner J Burns, Samuel C Rios, Thomas K Jordan, Qijun Gu, and Trevor Underwood. 2017. Analysis and Exercises for Engaging Beginners in Online CTF Competitions for Security Education. In 2017 USENIX Workshop on Advances in Security Education (ASE 17). USENIX, Vancouver, BC, Canada, bibinfonumpages9 pages."},{"key":"e_1_3_2_1_12_1","first-page":"10","volume-title":"PicoCTF: A game-based computer security competition for high school students. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14)","author":"Chapman Peter","unstructured":"Peter Chapman , Jonathan Burket , and David Brumley . 2014. PicoCTF: A game-based computer security competition for high school students. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14) . USENIX , San Diego, CA , bibinfonumpages 10 pages. Peter Chapman, Jonathan Burket, and David Brumley. 2014. PicoCTF: A game-based computer security competition for high school students. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14) . USENIX, San Diego, CA, bibinfonumpages10 pages."},{"key":"e_1_3_2_1_13_1","volume-title":"2017 USENIX Workshop on Advances in Security Education (ASE 17)","author":"Chung Kevin","year":"2017","unstructured":"Kevin Chung . 2017 . Live Lesson: Lowering the Barriers to Capture The Flag Administration and Participation . In 2017 USENIX Workshop on Advances in Security Education (ASE 17) . USENIX, Vancouver, BC, Canada, bibinfonumpages6 pages. Kevin Chung. 2017. Live Lesson: Lowering the Barriers to Capture The Flag Administration and Participation. In 2017 USENIX Workshop on Advances in Security Education (ASE 17) . USENIX, Vancouver, BC, Canada, bibinfonumpages6 pages."},{"key":"e_1_3_2_1_14_1","unstructured":"CISA. 2021 a. Joint Cybersecurity Advisory: Conti Ransomware. CISA. 2021 a. Joint Cybersecurity Advisory: Conti Ransomware."},{"key":"e_1_3_2_1_15_1","unstructured":"CISA. 2021 b. Known Exploited Vulnerabilities Catalog.. https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog CISA. 2021 b. Known Exploited Vulnerabilities Catalog.. https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176342"},{"key":"e_1_3_2_1_17_1","unstructured":"Christian Collberg. 2021. The Tigress C Obfuscator. https:\/\/tigress.wtf\/ Christian Collberg. 2021. The Tigress C Obfuscator. https:\/\/tigress.wtf\/"},{"key":"e_1_3_2_1_18_1","volume-title":"AngErza: Automated Exploit Generation. In Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE","author":"Dixit Shruti","year":"2021","unstructured":"Shruti Dixit , TK Geethna , Swaminathan Jayaraman , and Vipin Pavithran . 2021 . AngErza: Automated Exploit Generation. In Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE , West Bengal, India, 1--6. Shruti Dixit, TK Geethna, Swaminathan Jayaraman, and Vipin Pavithran. 2021. AngErza: Automated Exploit Generation. In Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, West Bengal, India, 1--6."},{"key":"e_1_3_2_1_19_1","first-page":"15","volume-title":"Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries","author":"Duan Ruian","unstructured":"Ruian Duan , Ashish Bijlani , Yang Ji , Omar Alrawi , Yiyuan Xiong , Moses Ike , Brendan Saltaformaggio , and Wenke Lee . 2019. Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries .. In NDSS. Internet Society , San Diego, CA , bibinfonumpages 15 pages. Ruian Duan, Ashish Bijlani, Yang Ji, Omar Alrawi, Yiyuan Xiong, Moses Ike, Brendan Saltaformaggio, and Wenke Lee. 2019. Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries.. In NDSS. Internet Society, San Diego, CA, bibinfonumpages15 pages."},{"key":"e_1_3_2_1_20_1","unstructured":"Fabian Faessler. 2015. LiveOverflow: Reversing and Cracking First Simple Program - Bin 0x05. https:\/\/www.youtube.com\/watch?v=VroEiMOJPm8 Fabian Faessler. 2015. LiveOverflow: Reversing and Cracking First Simple Program - Bin 0x05. https:\/\/www.youtube.com\/watch?v=VroEiMOJPm8"},{"key":"e_1_3_2_1_21_1","unstructured":"Fabian Faessler. 2016. LiveOverflow: Simple Tools and Techniques for Reversing a Binary - Bin 0x06. https:\/\/www.youtube.com\/watch?v=3NTXFUxcKPc Fabian Faessler. 2016. LiveOverflow: Simple Tools and Techniques for Reversing a Binary - Bin 0x06. https:\/\/www.youtube.com\/watch?v=3NTXFUxcKPc"},{"key":"e_1_3_2_1_22_1","unstructured":"Fabian Faessler. 2019. LiveOverflow: Patching Binaries. https:\/\/www.youtube.com\/watch?v=LyNyf3UM9Yc Fabian Faessler. 2019. LiveOverflow: Patching Binaries. https:\/\/www.youtube.com\/watch?v=LyNyf3UM9Yc"},{"key":"e_1_3_2_1_23_1","unstructured":"John Hammond. 2020. Google CTF - Beginner Reverse Engineering with Angr. https:\/\/www.youtube.com\/watch?v=RCgEIBfnTEI John Hammond. 2020. Google CTF - Beginner Reverse Engineering with Angr. https:\/\/www.youtube.com\/watch?v=RCgEIBfnTEI"},{"key":"e_1_3_2_1_24_1","unstructured":"Hex Rays. 2022. IDA Educational Licenses. https:\/\/hex-rays.com\/educational\/ Hex Rays. 2022. IDA Educational Licenses. https:\/\/hex-rays.com\/educational\/"},{"key":"e_1_3_2_1_25_1","unstructured":"Mateusz Jurczyk. 2020. Windows System Call Tables. https:\/\/github.com\/j00ru\/windows-syscalls Mateusz Jurczyk. 2020. Windows System Call Tables. https:\/\/github.com\/j00ru\/windows-syscalls"},{"key":"e_1_3_2_1_26_1","unstructured":"Max Kamper. 2021. ROP Emporium. https:\/\/ropemporium.com Max Kamper. 2021. ROP Emporium. https:\/\/ropemporium.com"},{"key":"e_1_3_2_1_27_1","unstructured":"Peter LaFosse. 2017. Automating Opaque Predicate Removal. https:\/\/binary.ninja\/2017\/10\/01\/automated-opaque-predicate-removal.html Peter LaFosse. 2017. Automating Opaque Predicate Removal. https:\/\/binary.ninja\/2017\/10\/01\/automated-opaque-predicate-removal.html"},{"key":"e_1_3_2_1_28_1","unstructured":"Xusheng Li. 2021. Winning The Grand Reverse Engineering Challenge. https:\/\/binary.ninja\/2021\/09\/02\/winning-the-grand-re-challenge.html Xusheng Li. 2021. Winning The Grand Reverse Engineering Challenge. https:\/\/binary.ninja\/2021\/09\/02\/winning-the-grand-re-challenge.html"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Danjun Liu Jingyuan Wang Zelin Rong Xianya Mi Fangyu Gai Yong Tang and Baosheng Wang. 2018. Pangr: A Behavior-Based Automatic Vulnerability Detection and Exploitation Framework. In Conference On Trust Security And Privacy In Computing And Communications\/12th IEEE International Conference On Big Data Science And Engineering. IEEE New York NY 705--712. Danjun Liu Jingyuan Wang Zelin Rong Xianya Mi Fangyu Gai Yong Tang and Baosheng Wang. 2018. Pangr: A Behavior-Based Automatic Vulnerability Detection and Exploitation Framework. In Conference On Trust Security And Privacy In Computing And Communications\/12th IEEE International Conference On Big Data Science And Engineering. IEEE New York NY 705--712.","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00103"},{"key":"e_1_3_2_1_30_1","unstructured":"Chris Lomont. 2009. Introduction to x64 Assembly - Intel. https:\/\/www.intel.com\/content\/dam\/develop\/external\/us\/en\/documents\/introduction-to-x64-assembly-181178.pdf Chris Lomont. 2009. Introduction to x64 Assembly - Intel. https:\/\/www.intel.com\/content\/dam\/develop\/external\/us\/en\/documents\/introduction-to-x64-assembly-181178.pdf"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Maria Markstedter. 2020. Introduction to ARM Assembly Basics. https:\/\/azeria-labs.com\/writing-arm-assembly-part-1\/ Maria Markstedter. 2020. Introduction to ARM Assembly Basics. https:\/\/azeria-labs.com\/writing-arm-assembly-part-1\/","DOI":"10.1016\/B978-0-12-819221-4.00008-0"},{"key":"e_1_3_2_1_32_1","unstructured":"Michael Matz Jan Hubicka Andreas Jaeger and Mark Mitchell. 2013. System V ABI. https:\/\/refspecs.linuxbase.org\/elf\/x86_64-abi-0.99.pdf Michael Matz Jan Hubicka Andreas Jaeger and Mark Mitchell. 2013. System V ABI. https:\/\/refspecs.linuxbase.org\/elf\/x86_64-abi-0.99.pdf"},{"key":"e_1_3_2_1_33_1","unstructured":"Microsoft. 2021 a. Visual Studio 2019: x64 Calling Convention. https:\/\/docs.microsoft.com\/en-us\/cpp\/build\/x64-calling-convention?view=msvc-160 Microsoft. 2021 a. Visual Studio 2019: x64 Calling Convention. https:\/\/docs.microsoft.com\/en-us\/cpp\/build\/x64-calling-convention?view=msvc-160"},{"key":"e_1_3_2_1_34_1","unstructured":"Microsoft. 2021 b. MSRC Customer Guidance Security Update Gude: Vulnerability CVE-2021--1675. Windows Print Spooler Remote Code Execution Vulnerability.. https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021--1675 Microsoft. 2021 b. MSRC Customer Guidance Security Update Gude: Vulnerability CVE-2021--1675. Windows Print Spooler Remote Code Execution Vulnerability.. https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021--1675"},{"key":"e_1_3_2_1_35_1","unstructured":"Microsoft. 2021 c. MSRC Customer Guidance Security Update Gude: Vulnerability CVE-2021--34527. Windows Print Spooler Remote Code Execution Vulnerability.. https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021--34527 Microsoft. 2021 c. MSRC Customer Guidance Security Update Gude: Vulnerability CVE-2021--34527. Windows Print Spooler Remote Code Execution Vulnerability.. https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021--34527"},{"key":"e_1_3_2_1_36_1","unstructured":"MITRE. 2020. CVE-2021--1675. Available from MITRE CVE-ID CVE-2021--1675.. http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021--1675 MITRE. 2020. CVE-2021--1675. Available from MITRE CVE-ID CVE-2021--1675.. http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021--1675"},{"key":"e_1_3_2_1_37_1","unstructured":"MITRE. 2021. CVE-2021--34527. Available from MITRE CVE-ID CVE-2021--34527.. http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021--34527 MITRE. 2021. CVE-2021--34527. Available from MITRE CVE-ID CVE-2021--34527.. http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021--34527"},{"key":"e_1_3_2_1_38_1","unstructured":"NSA. 2022. Academic Requirements for Designation as a CAE in Cyber Operations Fundamental. https:\/\/www.nsa.gov\/Resources\/Students-Educators\/centers-academic-excellence\/cae-co-fundamental\/requirements\/ NSA. 2022. Academic Requirements for Designation as a CAE in Cyber Operations Fundamental. https:\/\/www.nsa.gov\/Resources\/Students-Educators\/centers-academic-excellence\/cae-co-fundamental\/requirements\/"},{"volume-title":"HELO DarkSide: Breaking Free From Katas and Embracing the Adversarial Mindset in Cybersecurity Education","author":"Connor TJ","key":"e_1_3_2_1_39_1","unstructured":"TJ O Connor . 2022. HELO DarkSide: Breaking Free From Katas and Embracing the Adversarial Mindset in Cybersecurity Education . In Special Interest Group on Cyber Security Education (SIGCSE). ACM, Virtual Event. TJ OConnor. 2022. HELO DarkSide: Breaking Free From Katas and Embracing the Adversarial Mindset in Cybersecurity Education. In Special Interest Group on Cyber Security Education (SIGCSE). ACM, Virtual Event."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"TJ OConnor and Chris Stricklan. 2021. Teaching a Hands-On Mobile and Wireless Cybersecurity Course. In Innovation and Technology in Computer Science Education (ITiCSE). ACM Virtual Event 296--302. TJ OConnor and Chris Stricklan. 2021. Teaching a Hands-On Mobile and Wireless Cybersecurity Course. In Innovation and Technology in Computer Science Education (ITiCSE). ACM Virtual Event 296--302.","DOI":"10.1145\/3430665.3456346"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Rodney Petersen Danielle Santos Matthew Smith and Gregory Witte. 2020. Workforce Framework for Cybersecurity (NICE Framework). Rodney Petersen Danielle Santos Matthew Smith and Gregory Witte. 2020. Workforce Framework for Cybersecurity (NICE Framework).","DOI":"10.6028\/NIST.SP.800-181r1-draft"},{"key":"e_1_3_2_1_42_1","unstructured":"Matt Pietrek. 2002. An In-Depth Look into the Win32 Portable Executable File Format. https:\/\/docs.microsoft.com\/en-us\/archive\/msdn-magazine\/2002\/february\/inside-windows-win32-portable-executable-file-format-in-detail Matt Pietrek. 2002. An In-Depth Look into the Win32 Portable Executable File Format. https:\/\/docs.microsoft.com\/en-us\/archive\/msdn-magazine\/2002\/february\/inside-windows-win32-portable-executable-file-format-in-detail"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338503.3357725"},{"key":"e_1_3_2_1_44_1","volume-title":"Phrack: Cyber Grand Shellphish","author":"Shellphish Team","year":"2017","unstructured":"Team Shellphish . 2017 . Phrack: Cyber Grand Shellphish . http:\/\/www.phrack.org\/issues\/70\/4.html#article Team Shellphish. 2017. Phrack: Cyber Grand Shellphish. http:\/\/www.phrack.org\/issues\/70\/4.html#article"},{"key":"e_1_3_2_1_45_1","volume-title":"Pacific Asia Conference on Information Systems (PACIS). Association For Information System","author":"Milton Shen Wei-Cheng","year":"2016","unstructured":"Wei-Cheng Milton Shen , De Liu , Radhika Santhanam , and Dorla A Evans . 2016 . Gamified technology-mediated learning: The role of individual differences . In Pacific Asia Conference on Information Systems (PACIS). Association For Information System , Chiayi, Taiwan, bibinfonumpages18 pages. Wei-Cheng Milton Shen, De Liu, Radhika Santhanam, and Dorla A Evans. 2016. Gamified technology-mediated learning: The role of individual differences. In Pacific Asia Conference on Information Systems (PACIS). Association For Information System, Chiayi, Taiwan, bibinfonumpages18 pages."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.132"},{"key":"e_1_3_2_1_48_1","volume-title":"2018 Workshop on Advances in Security Education (ASE 18)","author":"Springer Jacob","year":"2018","unstructured":"Jacob Springer and Wu-chang Feng. 2018 . Teaching with angr: A Symbolic Execution Curriculum and $$CTF$$ . In 2018 Workshop on Advances in Security Education (ASE 18) . USENIX, Baltimore, MD, bibinfonumpages8 pages. Jacob Springer and Wu-chang Feng. 2018. Teaching with angr: A Symbolic Execution Curriculum and $$CTF$$. In 2018 Workshop on Advances in Security Education (ASE 18). USENIX, Baltimore, MD, bibinfonumpages8 pages."},{"key":"e_1_3_2_1_49_1","unstructured":"Richard Stallman Roland Pesch and Stan Shebs. 2021. Debugging with GDB . https:\/\/sourceware.org\/gdb\/current\/onlinedocs\/gdb\/index.html Richard Stallman Roland Pesch and Stan Shebs. 2021. Debugging with GDB . https:\/\/sourceware.org\/gdb\/current\/onlinedocs\/gdb\/index.html"},{"key":"e_1_3_2_1_50_1","first-page":"16","volume-title":"Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In NDSS","author":"Stephens Nick","year":"2016","unstructured":"Nick Stephens , John Grosen , Christopher Salls , Audrey Dutcher , Ruoyu Wang , Jacopo Corbetta , Yan Shoshitaishvili , Christopher Kruegel , and Giovanni Vigna . 2016 . Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In NDSS . Internet Society , San Diego, CA , bibinfonumpages 16 pages. Nick Stephens, John Grosen, Christopher Salls, Audrey Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2016. Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In NDSS . Internet Society, San Diego, CA, bibinfonumpages16 pages."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Chris Stricklan and TJ OConnor. 2021. Towards Binary Diversified Challenges For A Hands-On Reverse Engineering Course. In Innovation and Technology in Computer Science Education (ITiCSE) . ACM Virtual Event 102--107. Chris Stricklan and TJ OConnor. 2021. Towards Binary Diversified Challenges For A Hands-On Reverse Engineering Course. In Innovation and Technology in Computer Science Education (ITiCSE) . ACM Virtual Event 102--107.","DOI":"10.1145\/3430665.3456358"},{"key":"e_1_3_2_1_52_1","volume-title":"Workshop on Advances in Security Education . USENIX","author":"Taylor Clark","year":"2016","unstructured":"Clark Taylor and Christian Colberg . 2016 . A tool for teaching reverse engineering . In Workshop on Advances in Security Education . USENIX , Vancouver, BC, bibinfonumpages8 pages. Clark Taylor and Christian Colberg. 2016. A tool for teaching reverse engineering. In Workshop on Advances in Security Education . USENIX, Vancouver, BC, bibinfonumpages8 pages."},{"key":"e_1_3_2_1_53_1","unstructured":"Team Teso. 2001. Exploiting Format String Vulnerabilities. http:\/\/www.madchat.fr\/coding\/c\/c.seku\/format_string\/formatstring.pdf Team Teso. 2001. Exploiting Format String Vulnerabilities. http:\/\/www.madchat.fr\/coding\/c\/c.seku\/format_string\/formatstring.pdf"},{"key":"e_1_3_2_1_54_1","unstructured":"TIS Committee. 1993. Tool Interface Standard (TIS): Portable Formats Specification Version 1.1. http:\/\/refspecs.linux-foundation.org\/elf\/TIS1.1.pdf TIS Committee. 1993. Tool Interface Standard (TIS): Portable Formats Specification Version 1.1. http:\/\/refspecs.linux-foundation.org\/elf\/TIS1.1.pdf"},{"key":"e_1_3_2_1_55_1","unstructured":"Linus Torvalds. 2021. The Linux Kernel: Linux Networking. https:\/\/linux-kernel-labs.github.io\/refs\/heads\/master\/labs\/networking.html Linus Torvalds. 2021. The Linux Kernel: Linux Networking. https:\/\/linux-kernel-labs.github.io\/refs\/heads\/master\/labs\/networking.html"},{"key":"e_1_3_2_1_56_1","unstructured":"Yu-Jye Tung. 2021. Analysis of Anti-Analysis. https:\/\/github.com\/yellowbyte\/analysis-of-anti-analysis\/ Yu-Jye Tung. 2021. Analysis of Anti-Analysis. https:\/\/github.com\/yellowbyte\/analysis-of-anti-analysis\/"},{"key":"e_1_3_2_1_57_1","unstructured":"Vector35. 2022. Binary Ninja. https:\/\/binary.ninja Vector35. 2022. Binary Ninja. https:\/\/binary.ninja"},{"volume-title":"Angr-the next generation of binary analysis. In 2017 IEEE Cybersecurity Development","author":"Wang Fish","key":"e_1_3_2_1_58_1","unstructured":"Fish Wang and Yan Shoshitaishvili . 2017. Angr-the next generation of binary analysis. In 2017 IEEE Cybersecurity Development . IEEE , Cambridge, MA , 8--9. Fish Wang and Yan Shoshitaishvili. 2017. Angr-the next generation of binary analysis. In 2017 IEEE Cybersecurity Development . IEEE, Cambridge, MA, 8--9."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE49443.2020.00036"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_31"}],"event":{"name":"ITiCSE 2022: Innovation and Technology in Computer Science Education","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Dublin Ireland","acronym":"ITiCSE 2022"},"container-title":["Proceedings of the 27th ACM Conference on on Innovation and Technology in Computer Science Education Vol. 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3502718.3524744","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3502718.3524744","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3502718.3524744","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:46Z","timestamp":1750183786000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3502718.3524744"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,7]]},"references-count":60,"alternative-id":["10.1145\/3502718.3524744","10.1145\/3502718"],"URL":"https:\/\/doi.org\/10.1145\/3502718.3524744","relation":{},"subject":[],"published":{"date-parts":[[2022,7,7]]},"assertion":[{"value":"2022-07-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}