Gregory J. Conti, Erik Dean, Matthew Sinda, Benjamin Sangster. Visual Reverse Engineering of Binary and Data Files. In John R. Goodall, Gregory J. Conti, Kwan-Liu Ma, editors, Visualization for Computer Security, 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings. Volume 5210 of Lecture Notes in Computer Science, pages 1-17, Springer, 2008. [doi]
@inproceedings{ContiDSS08, title = {Visual Reverse Engineering of Binary and Data Files}, author = {Gregory J. Conti and Erik Dean and Matthew Sinda and Benjamin Sangster}, year = {2008}, doi = {10.1007/978-3-540-85933-8_1}, url = {http://dx.doi.org/10.1007/978-3-540-85933-8_1}, tags = {reverse engineering, data-flow}, researchr = {https://researchr.org/publication/ContiDSS08}, cites = {0}, citedby = {0}, pages = {1-17}, booktitle = {Visualization for Computer Security, 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings}, editor = {John R. Goodall and Gregory J. Conti and Kwan-Liu Ma}, volume = {5210}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-540-85931-4}, }