… engineers are using reverse engineering methods to respond to attacks. The security … or the decryption of encrypted content, brings unique challenges to reverse engineering: work … an understanding of this reverse engineering work, we report on an exploratory …
In Proceedings of the 18th Working Conference on Reverse Engineering. 2011: 184-188 [doi]… engineers are using reverse engineering methods to respond to attacks. The security … or the decryption of encrypted content, brings unique challenges to reverse engineering: work … an understanding of this reverse engineering work, we conducted an exploratory study …
In Foundations of Augmented Cognition. Volume 8027 of Lecture Notes in Computer Science, pages 113-122, Springer Berlin Heidelberg, 2013. [doi]