Visual Reverse Engineering of Binary and Data Files

Gregory J. Conti, Erik Dean, Matthew Sinda, Benjamin Sangster. Visual Reverse Engineering of Binary and Data Files. In John R. Goodall, Gregory J. Conti, Kwan-Liu Ma, editors, Visualization for Computer Security, 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings. Volume 5210 of Lecture Notes in Computer Science, pages 1-17, Springer, 2008. [doi]

@inproceedings{ContiDSS08,
  title = {Visual Reverse Engineering of Binary and Data Files},
  author = {Gregory J. Conti and Erik Dean and Matthew Sinda and Benjamin Sangster},
  year = {2008},
  doi = {10.1007/978-3-540-85933-8_1},
  url = {http://dx.doi.org/10.1007/978-3-540-85933-8_1},
  tags = {reverse engineering, data-flow},
  researchr = {https://researchr.org/publication/ContiDSS08},
  cites = {0},
  citedby = {0},
  pages = {1-17},
  booktitle = {Visualization for Computer Security, 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings},
  editor = {John R. Goodall and Gregory J. Conti and Kwan-Liu Ma},
  volume = {5210},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-540-85931-4},
}