3491593
CJ62DUS2
1
apa
50
default
51
https://hcommons-staging.org/app/plugins/zotpress/
%7B%22status%22%3A%22success%22%2C%22updateneeded%22%3Afalse%2C%22instance%22%3Afalse%2C%22meta%22%3A%7B%22request_last%22%3A50%2C%22request_next%22%3A50%2C%22used_cache%22%3Atrue%7D%2C%22data%22%3A%5B%7B%22key%22%3A%22W8YULQCM%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Wynter%22%2C%22parsedDate%22%3A%221992%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BWynter%2C%20S.%20%281992%29.%20%26lt%3Bi%26gt%3BRethinking%20%26%23x201C%3BAesthetics%26%23x201D%3B%3A%20Notes%20Towards%20a%20Deciphering%20Practice%26lt%3B%5C%2Fi%26gt%3B.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fmonoskop.org%5C%2Fimages%5C%2F9%5C%2F98%5C%2FWynter_Sylvia_1992_Rethinking_Aesthetics_Notes_Towards_a_Deciphering_Practice.pdf%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fmonoskop.org%5C%2Fimages%5C%2F9%5C%2F98%5C%2FWynter_Sylvia_1992_Rethinking_Aesthetics_Notes_Towards_a_Deciphering_Practice.pdf%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22bookSection%22%2C%22title%22%3A%22Rethinking%20%5C%22Aesthetics%5C%22%3A%20Notes%20Towards%20a%20Deciphering%20Practice%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sylvia%22%2C%22lastName%22%3A%22Wynter%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22bookTitle%22%3A%22%22%2C%22date%22%3A%221992%22%2C%22language%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fmonoskop.org%5C%2Fimages%5C%2F9%5C%2F98%5C%2FWynter_Sylvia_1992_Rethinking_Aesthetics_Notes_Towards_a_Deciphering_Practice.pdf%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222022-02-08T17%3A15%3A09Z%22%7D%7D%2C%7B%22key%22%3A%22U663EE4N%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Seaver%22%2C%22parsedDate%22%3A%222014-01-27%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BSeaver%2C%20N.%20%282014%2C%20January%2027%29.%20%26lt%3Bi%26gt%3BOn%20Reverse%20Engineering%3A%20Looking%20for%20the%20Cultural%20Work%20of%20Engineers%26lt%3B%5C%2Fi%26gt%3B.%20Medium.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fmedium.com%5C%2Fanthropology-and-algorithms%5C%2Fon-reverse-engineering-d9f5bae87812%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fmedium.com%5C%2Fanthropology-and-algorithms%5C%2Fon-reverse-engineering-d9f5bae87812%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22On%20Reverse%20Engineering%3A%20Looking%20for%20the%20Cultural%20Work%20of%20Engineers%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nick%22%2C%22lastName%22%3A%22Seaver%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22Jan%2027%2C%202014%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fmedium.com%5C%2Fanthropology-and-algorithms%5C%2Fon-reverse-engineering-d9f5bae87812%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%22FUFEH7GM%22%2C%22CJ62DUS2%22%2C%22AWAYUE9B%22%2C%22K6E9XXTP%22%2C%22MS8JZI5I%22%2C%22Q45SJPG4%22%5D%2C%22dateModified%22%3A%222021-07-26T08%3A00%3A05Z%22%7D%7D%2C%7B%22key%22%3A%22JPVZRNF2%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Bryant%22%2C%22parsedDate%22%3A%222012%22%2C%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BBryant%2C%20A.%20R.%20%282012%29.%20%26lt%3Bi%26gt%3BUnderstanding%20How%20Reverse%20Engineers%20Make%20Sense%20of%20Programs%20from%20Assembly%20Language%20Representations%26lt%3B%5C%2Fi%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22thesis%22%2C%22title%22%3A%22Understanding%20How%20Reverse%20Engineers%20Make%20Sense%20of%20Programs%20from%20Assembly%20Language%20Representations%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Adam%20R.%22%2C%22lastName%22%3A%22Bryant%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22thesisType%22%3A%22%22%2C%22university%22%3A%22%22%2C%22date%22%3A%222012%22%2C%22language%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-19T16%3A06%3A51Z%22%7D%7D%2C%7B%22key%22%3A%22AK92QULD%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Pierce%22%2C%22parsedDate%22%3A%222005%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BPierce%2C%20C.%20%282005%29.%20Reverse%20Engineering%20the%20Ceramic%20Cooking%20Pot%3A%20Cost%20and%20Performance%20Properties%20of%20Plain%20and%20Textured%20Vessels.%20%26lt%3Bi%26gt%3BJournal%20of%20Archaeological%20Method%20and%20Theory%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B12%26lt%3B%5C%2Fi%26gt%3B%282%29%2C%20117%26%23x2013%3B157.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Reverse%20Engineering%20the%20Ceramic%20Cooking%20Pot%3A%20Cost%20and%20Performance%20Properties%20of%20Plain%20and%20Textured%20Vessels%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Christopher%22%2C%22lastName%22%3A%22Pierce%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222005%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-19T05%3A45%3A35Z%22%7D%7D%2C%7B%22key%22%3A%22DBRPCSDI%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Queloz%22%2C%22parsedDate%22%3A%222021%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BQueloz%2C%20M.%20%282021%29.%20%26lt%3Bi%26gt%3BThe%20Practical%20Origins%20of%20Ideas%3A%20Genealogy%20as%20Conceptual%20Reverse-Engineering%26lt%3B%5C%2Fi%26gt%3B.%20Oxford%20University%20Press.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22book%22%2C%22title%22%3A%22The%20Practical%20Origins%20of%20Ideas%3A%20Genealogy%20as%20Conceptual%20Reverse-Engineering%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Matthieu%22%2C%22lastName%22%3A%22Queloz%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222021%22%2C%22language%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-19T05%3A44%3A47Z%22%7D%7D%2C%7B%22key%22%3A%22EMKEZ6NR%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Lefebvre%20et%20al.%22%2C%22parsedDate%22%3A%222012%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BLefebvre%2C%20C.%2C%20Rieckhof%2C%20G.%2C%20%26amp%3B%20Califano%2C%20A.%20%282012%29.%20Reverse-Engineering%20Human%20Regulatory%20Networks.%20%26lt%3Bi%26gt%3BWiley%20Interdisciplinary%20Reviews%3A%20Systems%20Biology%20and%20Medicine%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B4%26lt%3B%5C%2Fi%26gt%3B%284%29%2C%20311%26%23x2013%3B325.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1002%5C%2Fwsbm.1159%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1002%5C%2Fwsbm.1159%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Reverse-Engineering%20Human%20Regulatory%20Networks%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Celine%22%2C%22lastName%22%3A%22Lefebvre%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Gabrielle%22%2C%22lastName%22%3A%22Rieckhof%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Andrea%22%2C%22lastName%22%3A%22Califano%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%2207%5C%2F2012%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1002%5C%2Fwsbm.1159%22%2C%22ISSN%22%3A%2219395094%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fdoi.wiley.com%5C%2F10.1002%5C%2Fwsbm.1159%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T20%3A28%3A22Z%22%7D%7D%2C%7B%22key%22%3A%224FWJ6VRS%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Paxson%22%2C%22parsedDate%22%3A%222010%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BPaxson%2C%20H.%20%282010%29.%20Locating%20Value%20in%20Artisan%20Cheese%3A%20Reverse%20Engineering%20Terroir%20for%20New-World%20Landscapes.%20%26lt%3Bi%26gt%3BAmerican%20Anthropologist%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B112%26lt%3B%5C%2Fi%26gt%3B%283%29%2C%20444%26%23x2013%3B457.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Locating%20Value%20in%20Artisan%20Cheese%3A%20Reverse%20Engineering%20Terroir%20for%20New-World%20Landscapes%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Heather%22%2C%22lastName%22%3A%22Paxson%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222010%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T20%3A28%3A04Z%22%7D%7D%2C%7B%22key%22%3A%228IL5NRF4%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Moshenska%22%2C%22parsedDate%22%3A%222016%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BMoshenska%2C%20G.%20%282016%29.%20Reverse%20Engineering%20and%20the%20Archaeology%20of%20the%20Modern%20World.%20%26lt%3Bi%26gt%3BForum%20Kritische%20Arch%26%23xE4%3Bologie%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B5%26lt%3B%5C%2Fi%26gt%3B%2C%2016%26%23x2013%3B28.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22Reverse%20Engineering%20and%20the%20Archaeology%20of%20the%20Modern%20World%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Gabriel%22%2C%22lastName%22%3A%22Moshenska%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222016%22%2C%22proceedingsTitle%22%3A%22Forum%20Kritische%20Arch%5Cu00e4ologie%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T20%3A27%3A48Z%22%7D%7D%2C%7B%22key%22%3A%226HW4BWTY%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Bennett%20et%20al.%22%2C%22parsedDate%22%3A%222008%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BBennett%2C%20C.%2C%20Myers%2C%20D.%2C%20Storey%2C%20M.-A.%2C%20German%2C%20D.%20M.%2C%20Ouellet%2C%20D.%2C%20Salois%2C%20M.%2C%20%26amp%3B%20Charland%2C%20P.%20%282008%29.%20A%20Survey%20and%20Evaluation%20of%20Tool%20Features%20for%20Understanding%20Reverse-Engineered%20Sequence%20Diagrams.%20%26lt%3Bi%26gt%3BJournal%20of%20Software%20Maintenance%20and%20Evolution%3A%20Research%20and%20Practice%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B20%26lt%3B%5C%2Fi%26gt%3B%284%29%2C%20291%26%23x2013%3B315.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22A%20Survey%20and%20Evaluation%20of%20Tool%20Features%20for%20Understanding%20Reverse-Engineered%20Sequence%20Diagrams%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Chris%22%2C%22lastName%22%3A%22Bennett%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Del%22%2C%22lastName%22%3A%22Myers%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22M.-A.%22%2C%22lastName%22%3A%22Storey%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Daniel%20M.%22%2C%22lastName%22%3A%22German%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22David%22%2C%22lastName%22%3A%22Ouellet%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Martin%22%2C%22lastName%22%3A%22Salois%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Philippe%22%2C%22lastName%22%3A%22Charland%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222008%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T20%3A27%3A03Z%22%7D%7D%2C%7B%22key%22%3A%222ZV25D8A%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Cowley%22%2C%22parsedDate%22%3A%222014%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BCowley%2C%20J.%20%282014%29.%20%26lt%3Bi%26gt%3BJob%20Analysis%20Results%20for%20Malicious-Code%20Reverse%20Engineers%3A%20A%20Case%20Study%26lt%3B%5C%2Fi%26gt%3B.%20CARNEGIE-MELLON%20UNIV%20PITTSBURGH%20PA%20SOFTWARE%20ENGINEERING%20INST.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Job%20Analysis%20Results%20for%20Malicious-Code%20Reverse%20Engineers%3A%20A%20Case%20Study%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jennifer%22%2C%22lastName%22%3A%22Cowley%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22CARNEGIE-MELLON%20UNIV%20PITTSBURGH%20PA%20SOFTWARE%20ENGINEERING%20INST%22%2C%22date%22%3A%222014%22%2C%22language%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T20%3A19%3A08Z%22%7D%7D%2C%7B%22key%22%3A%22AQEDZ9V8%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Henry%20and%20Peterson%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BHenry%2C%20W.%20C.%2C%20%26amp%3B%20Peterson%2C%20G.%20L.%20%282020%29.%20Sensorre%3A%20Provenance%20Support%20for%20Software%20Reverse%20Engineers.%20%26lt%3Bi%26gt%3BComputers%20%26amp%3B%20Security%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B95%26lt%3B%5C%2Fi%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Sensorre%3A%20Provenance%20Support%20for%20Software%20Reverse%20Engineers%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Wayne%20C.%22%2C%22lastName%22%3A%22Henry%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Gilbert%20L.%22%2C%22lastName%22%3A%22Peterson%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T20%3A19%3A01Z%22%7D%7D%2C%7B%22key%22%3A%22T8T5GSD2%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Seitz%22%2C%22parsedDate%22%3A%222009%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BSeitz%2C%20J.%20%282009%29.%20%26lt%3Bi%26gt%3BGray%20Hat%20Python%3A%20Python%20Programming%20for%20Hackers%20and%20Reverse%20Engineers%26lt%3B%5C%2Fi%26gt%3B.%20no%20starch%20press.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22book%22%2C%22title%22%3A%22Gray%20Hat%20Python%3A%20Python%20Programming%20for%20Hackers%20and%20Reverse%20Engineers%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Justin%22%2C%22lastName%22%3A%22Seitz%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222009%22%2C%22language%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T20%3A18%3A49Z%22%7D%7D%2C%7B%22key%22%3A%22WNVBABKP%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Ducasse%20and%20Pollet%22%2C%22parsedDate%22%3A%222009%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BDucasse%2C%20S.%2C%20%26amp%3B%20Pollet%2C%20D.%20%282009%29.%20Software%20Architecture%20Reconstruction%3A%20A%20Process-Oriented%20Taxonomy.%20%26lt%3Bi%26gt%3BIEEE%20Transactions%20on%20Software%20Engineering%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B35%26lt%3B%5C%2Fi%26gt%3B%284%29%2C%20573%26%23x2013%3B591.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Software%20Architecture%20Reconstruction%3A%20A%20Process-Oriented%20Taxonomy%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22St%5Cu00e9phane%22%2C%22lastName%22%3A%22Ducasse%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Damien%22%2C%22lastName%22%3A%22Pollet%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222009%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T20%3A18%3A41Z%22%7D%7D%2C%7B%22key%22%3A%22B88CVAEI%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Samuelson%20and%20Scotchmer%22%2C%22parsedDate%22%3A%222002%22%2C%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BSamuelson%2C%20P.%2C%20%26amp%3B%20Scotchmer%2C%20S.%20%282002%29.%20The%20Law%20and%20Economics%20of%20Reverse%20Engineering.%20%26lt%3Bi%26gt%3BThe%20Yale%20Law%20Journal%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B111%26lt%3B%5C%2Fi%26gt%3B%287%29%2C%201575.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.2307%5C%2F797533%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.2307%5C%2F797533%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22The%20Law%20and%20Economics%20of%20Reverse%20Engineering%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Pamela%22%2C%22lastName%22%3A%22Samuelson%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Suzanne%22%2C%22lastName%22%3A%22Scotchmer%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%2205%5C%2F2002%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%2210.2307%5C%2F797533%22%2C%22ISSN%22%3A%2200440094%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.jstor.org%5C%2Fstable%5C%2F797533%3Forigin%3Dcrossref%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T13%3A32%3A43Z%22%7D%7D%2C%7B%22key%22%3A%22UC3IQMIH%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Muntz%20and%20Richards%22%2C%22parsedDate%22%3A%221993%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BMuntz%2C%20P.%20A.%20A.%2C%20%26amp%3B%20Richards%2C%20R.%20%281993%29.%20A%20Framework%20for%20Reverse%20Engineering%20DoD%20Legacy%20Information%20Systems.%20%26lt%3Bi%26gt%3BProceedings%20Working%20Conference%20on%20Reverse%20Engineering%26lt%3B%5C%2Fi%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22A%20Framework%20for%20Reverse%20Engineering%20DoD%20Legacy%20Information%20Systems%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Peter%20Aknt%20Alice%22%2C%22lastName%22%3A%22Muntz%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Russ%22%2C%22lastName%22%3A%22Richards%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%221993%22%2C%22proceedingsTitle%22%3A%22Proceedings%20Working%20Conference%20on%20Reverse%20Engineering%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T08%3A27%3A42Z%22%7D%7D%2C%7B%22key%22%3A%22AQ6ETX8U%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Votipka%20et%20al.%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BVotipka%2C%20D.%2C%20Rabin%2C%20S.%2C%20Micinski%2C%20K.%2C%20Foster%2C%20J.%20S.%2C%20%26amp%3B%20Mazurek%2C%20M.%20L.%20%282020%29.%20An%20Observational%20Investigation%20of%20Reverse%20Engineers%26%23x2019%3B%20Processes.%20%26lt%3Bi%26gt%3B29th%20USENIX%20Security%20Symposium%26lt%3B%5C%2Fi%26gt%3B%2C%201875%26%23x2013%3B1892.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22An%20Observational%20Investigation%20of%20Reverse%20Engineers%5Cu2019%20Processes%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Daniel%22%2C%22lastName%22%3A%22Votipka%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Seth%22%2C%22lastName%22%3A%22Rabin%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Kristopher%22%2C%22lastName%22%3A%22Micinski%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jeffrey%20S.%22%2C%22lastName%22%3A%22Foster%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Michelle%20L.%22%2C%22lastName%22%3A%22Mazurek%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22proceedingsTitle%22%3A%2229th%20USENIX%20Security%20Symposium%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T07%3A56%3A58Z%22%7D%7D%2C%7B%22key%22%3A%22BAIGUMZV%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Zuboff%20et%20al.%22%2C%22parsedDate%22%3A%222019%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BZuboff%2C%20S.%2C%20M%26%23xF6%3Bllers%2C%20N.%2C%20Wood%2C%20D.%20M.%2C%20%26amp%3B%20Lyon%2C%20D.%20%282019%29.%20Surveillance%20Capitalism%3A%20An%20Interview%20with%20Shoshana%20Zuboff.%20%26lt%3Bi%26gt%3BSurveillance%20%26amp%3B%20Society%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B17%26lt%3B%5C%2Fi%26gt%3B%281%5C%2F2%29%2C%20257%26%23x2013%3B266.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Surveillance%20Capitalism%3A%20An%20Interview%20with%20Shoshana%20Zuboff%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Shoshana%22%2C%22lastName%22%3A%22Zuboff%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Norma%22%2C%22lastName%22%3A%22M%5Cu00f6llers%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22David%20Murakami%22%2C%22lastName%22%3A%22Wood%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22David%22%2C%22lastName%22%3A%22Lyon%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222019%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T07%3A56%3A40Z%22%7D%7D%2C%7B%22key%22%3A%22E862X62I%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Votipka%20et%20al.%22%2C%22parsedDate%22%3A%222019%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BVotipka%2C%20D.%2C%20Rabin%2C%20S.%2C%20Micinski%2C%20K.%2C%20Foster%2C%20J.%20S.%2C%20%26amp%3B%20Mazurek%2C%20M.%20L.%20%282019%29.%20An%20Observational%20Investigation%20of%20Reverse%20Engineers%26%23x2019%3B%20Process%20and%20Mental%20Models.%20%26lt%3Bi%26gt%3BExtended%20Abstracts%20of%20the%202019%20CHI%20Conference%20on%20Human%20Factors%20in%20Computing%20Systems%26lt%3B%5C%2Fi%26gt%3B%2C%201%26%23x2013%3B6.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22An%20Observational%20Investigation%20of%20Reverse%20Engineers%27%20Process%20and%20Mental%20Models%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Daniel%22%2C%22lastName%22%3A%22Votipka%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Seth%22%2C%22lastName%22%3A%22Rabin%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Kristopher%22%2C%22lastName%22%3A%22Micinski%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jeffrey%20S.%22%2C%22lastName%22%3A%22Foster%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Michelle%20L.%22%2C%22lastName%22%3A%22Mazurek%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222019%22%2C%22proceedingsTitle%22%3A%22Extended%20Abstracts%20of%20the%202019%20CHI%20Conference%20on%20Human%20Factors%20in%20Computing%20Systems%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T07%3A56%3A18Z%22%7D%7D%2C%7B%22key%22%3A%223YFQ54ZC%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Henry%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BHenry%2C%20W.%20T.%20%282020%29.%20%26lt%3Bi%26gt%3BAnalytic%20Provenance%20for%20Software%20Reverse%20Engineers%26lt%3B%5C%2Fi%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Analytic%20Provenance%20for%20Software%20Reverse%20Engineers%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Wayne%20T.%22%2C%22lastName%22%3A%22Henry%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T07%3A56%3A18Z%22%7D%7D%2C%7B%22key%22%3A%226UACNJ6I%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Pollet%20et%20al.%22%2C%22parsedDate%22%3A%222007%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BPollet%2C%20D.%2C%20Ducasse%2C%20S.%2C%20Poyet%2C%20L.%2C%20Alloui%2C%20I.%2C%20Cimpan%2C%20S.%2C%20%26amp%3B%20Verjus%2C%20H.%20%282007%29.%20Towards%20a%20process-oriented%20software%20architecture%20reconstruction%20taxonomy.%20%26lt%3Bi%26gt%3B11th%20European%20Conference%20on%20Software%20Maintenance%20and%20Reengineering%20%28CSMR%26%23x2019%3B07%29%26lt%3B%5C%2Fi%26gt%3B%2C%20137%26%23x2013%3B148.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22Towards%20a%20process-oriented%20software%20architecture%20reconstruction%20taxonomy%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Damien%22%2C%22lastName%22%3A%22Pollet%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Stephane%22%2C%22lastName%22%3A%22Ducasse%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Loic%22%2C%22lastName%22%3A%22Poyet%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ilham%22%2C%22lastName%22%3A%22Alloui%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sorana%22%2C%22lastName%22%3A%22Cimpan%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Herve%22%2C%22lastName%22%3A%22Verjus%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222007%22%2C%22proceedingsTitle%22%3A%2211th%20European%20Conference%20on%20Software%20Maintenance%20and%20Reengineering%20%28CSMR%2707%29%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T07%3A56%3A18Z%22%7D%7D%2C%7B%22key%22%3A%22FSTWSUAD%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Wan%22%2C%22parsedDate%22%3A%222009%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BWan%2C%20F.%20%282009%29.%20%26lt%3Bi%26gt%3BReverse%20Engineering%20of%20Content%20as%20a%20Task%20for%20Finding%20Usability%20Problems%3A%20An%20Evaluative%20Case%20Study%20Using%20the%20Wikibreathe%20Tool%20for%20Online%20Creation%20of%20Asthma%20Action%20Plans%26lt%3B%5C%2Fi%26gt%3B%20%5BPhD%20Thesis%5D.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22thesis%22%2C%22title%22%3A%22Reverse%20Engineering%20of%20Content%20as%20a%20Task%20for%20Finding%20Usability%20Problems%3A%20An%20Evaluative%20Case%20Study%20Using%20the%20Wikibreathe%20Tool%20for%20Online%20Creation%20of%20Asthma%20Action%20Plans%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Flora%22%2C%22lastName%22%3A%22Wan%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22thesisType%22%3A%22PhD%20Thesis%22%2C%22university%22%3A%22%22%2C%22date%22%3A%222009%22%2C%22language%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T07%3A54%3A53Z%22%7D%7D%2C%7B%22key%22%3A%22CDZII3EV%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Rafferty%22%2C%22parsedDate%22%3A%222018%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BRafferty%2C%20J.%20%282018%29.%20Reverse%20Engineering%20Stone%20Atlatl%20Dart%20Points.%20%26lt%3Bi%26gt%3BLithic%20Technology%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B43%26lt%3B%5C%2Fi%26gt%3B%283%29%2C%20151%26%23x2013%3B165.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Reverse%20Engineering%20Stone%20Atlatl%20Dart%20Points%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Janet%22%2C%22lastName%22%3A%22Rafferty%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222018%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T07%3A54%3A47Z%22%7D%7D%2C%7B%22key%22%3A%22IVDFTSKI%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Botero%20et%20al.%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BBotero%2C%20U.%20J.%2C%20Wilson%2C%20R.%2C%20Lu%2C%20H.%2C%20Rahman%2C%20M.%20T.%2C%20Mallaiyan%2C%20M.%20A.%2C%20Ganji%2C%20F.%2C%20Asadizanjani%2C%20N.%2C%20Tehranipoor%2C%20M.%20M.%2C%20Woodard%2C%20D.%20L.%2C%20%26amp%3B%20Forte%2C%20D.%20%282020%29.%20Hardware%20Trust%20and%20Assurance%20Through%20Reverse%20Engineering%3A%20A%20Survey%20and%20Outlook%20from%20Image%20Analysis%20and%20Machine%20Learning%20Perspectives.%20%26lt%3Bi%26gt%3BArXiv%20Preprint%20ArXiv%3A2002.04210%26lt%3B%5C%2Fi%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Hardware%20Trust%20and%20Assurance%20Through%20Reverse%20Engineering%3A%20A%20Survey%20and%20Outlook%20from%20Image%20Analysis%20and%20Machine%20Learning%20Perspectives%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ulbert%20J.%22%2C%22lastName%22%3A%22Botero%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ronald%22%2C%22lastName%22%3A%22Wilson%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Hangwei%22%2C%22lastName%22%3A%22Lu%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Mir%20Tanjidur%22%2C%22lastName%22%3A%22Rahman%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Mukhil%20A.%22%2C%22lastName%22%3A%22Mallaiyan%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Fatemeh%22%2C%22lastName%22%3A%22Ganji%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Navid%22%2C%22lastName%22%3A%22Asadizanjani%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Mark%20M.%22%2C%22lastName%22%3A%22Tehranipoor%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Damon%20L.%22%2C%22lastName%22%3A%22Woodard%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Domenic%22%2C%22lastName%22%3A%22Forte%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%2C%225TFJABSG%22%5D%2C%22dateModified%22%3A%222021-06-18T07%3A54%3A08Z%22%7D%7D%2C%7B%22key%22%3A%22KJCARFWA%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Buonamici%20et%20al.%22%2C%22parsedDate%22%3A%222018%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BBuonamici%2C%20F.%2C%20Carfagni%2C%20M.%2C%20Furferi%2C%20R.%2C%20Governi%2C%20L.%2C%20Lapini%2C%20A.%2C%20%26amp%3B%20Volpe%2C%20Y.%20%282018%29.%20Reverse%20Engineering%20Modeling%20Methods%20and%20Tools%3A%20A%20Survey.%20%26lt%3Bi%26gt%3BComputer-Aided%20Design%20and%20Applications%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B15%26lt%3B%5C%2Fi%26gt%3B%283%29%2C%20443%26%23x2013%3B464.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Reverse%20Engineering%20Modeling%20Methods%20and%20Tools%3A%20A%20Survey%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Francesco%22%2C%22lastName%22%3A%22Buonamici%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Monica%22%2C%22lastName%22%3A%22Carfagni%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Rocco%22%2C%22lastName%22%3A%22Furferi%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Lapo%22%2C%22lastName%22%3A%22Governi%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Alessandro%22%2C%22lastName%22%3A%22Lapini%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Yary%22%2C%22lastName%22%3A%22Volpe%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222018%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T07%3A54%3A05Z%22%7D%7D%2C%7B%22key%22%3A%22BWH288VV%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Davis%20and%20Alken%22%2C%22parsedDate%22%3A%222000%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BDavis%2C%20K.%20H.%2C%20%26amp%3B%20Alken%2C%20P.%20H.%20%282000%29.%20Data%20Reverse%20Engineering%3A%20A%20Historical%20Survey.%20%26lt%3Bi%26gt%3BProceedings%20Seventh%20Working%20Conference%20on%20Reverse%20Engineering%26lt%3B%5C%2Fi%26gt%3B%2C%2070%26%23x2013%3B78.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22Data%20Reverse%20Engineering%3A%20A%20Historical%20Survey%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Kathi%20Hogshead%22%2C%22lastName%22%3A%22Davis%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22P.%20H.%22%2C%22lastName%22%3A%22Alken%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222000%22%2C%22proceedingsTitle%22%3A%22Proceedings%20Seventh%20Working%20Conference%20on%20Reverse%20Engineering%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T07%3A54%3A02Z%22%7D%7D%2C%7B%22key%22%3A%226D9PXD73%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Fyrbiak%20et%20al.%22%2C%22parsedDate%22%3A%222017%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BFyrbiak%2C%20M.%2C%20Strau%26%23xDF%3B%2C%20S.%2C%20Kison%2C%20C.%2C%20Wallat%2C%20S.%2C%20Elson%2C%20M.%2C%20Rummel%2C%20N.%2C%20%26amp%3B%20Paar%2C%20C.%20%282017%29.%20Hardware%20Reverse%20Engineering%3A%20Overview%20and%20Open%20Challenges.%20%26lt%3Bi%26gt%3B2017%20IEEE%202nd%20International%20Verification%20and%20Security%20Workshop%20%28IVSW%29%26lt%3B%5C%2Fi%26gt%3B%2C%2088%26%23x2013%3B94.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22Hardware%20Reverse%20Engineering%3A%20Overview%20and%20Open%20Challenges%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Marc%22%2C%22lastName%22%3A%22Fyrbiak%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sebastian%22%2C%22lastName%22%3A%22Strau%5Cu00df%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Christian%22%2C%22lastName%22%3A%22Kison%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sebastian%22%2C%22lastName%22%3A%22Wallat%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Malte%22%2C%22lastName%22%3A%22Elson%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nikol%22%2C%22lastName%22%3A%22Rummel%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Christof%22%2C%22lastName%22%3A%22Paar%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222017%22%2C%22proceedingsTitle%22%3A%222017%20IEEE%202nd%20International%20Verification%20and%20Security%20Workshop%20%28IVSW%29%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T07%3A53%3A58Z%22%7D%7D%2C%7B%22key%22%3A%226WDHJXAP%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Koschke%22%2C%22parsedDate%22%3A%222003%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BKoschke%2C%20R.%20%282003%29.%20Software%20Visualization%20in%20Software%20Maintenance%2C%20Reverse%20Engineering%2C%20and%20Re-Engineering%3A%20A%20Research%20Survey.%20%26lt%3Bi%26gt%3BJournal%20of%20Software%20Maintenance%20and%20Evolution%3A%20Research%20and%20Practice%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B15%26lt%3B%5C%2Fi%26gt%3B%282%29%2C%2087%26%23x2013%3B109.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Software%20Visualization%20in%20Software%20Maintenance%2C%20Reverse%20Engineering%2C%20and%20Re-Engineering%3A%20A%20Research%20Survey%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Rainer%22%2C%22lastName%22%3A%22Koschke%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222003%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T07%3A53%3A55Z%22%7D%7D%2C%7B%22key%22%3A%22MXPMJUXG%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Narayan%20et%20al.%22%2C%22parsedDate%22%3A%222015%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BNarayan%2C%20J.%2C%20Shukla%2C%20S.%20K.%2C%20%26amp%3B%20Clancy%2C%20T.%20C.%20%282015%29.%20A%20Survey%20of%20Automatic%20Protocol%20Reverse%20Engineering%20Tools.%20%26lt%3Bi%26gt%3BACM%20Computing%20Surveys%20%28CSUR%29%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B48%26lt%3B%5C%2Fi%26gt%3B%283%29%2C%201%26%23x2013%3B26.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22A%20Survey%20of%20Automatic%20Protocol%20Reverse%20Engineering%20Tools%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22John%22%2C%22lastName%22%3A%22Narayan%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sandeep%20K.%22%2C%22lastName%22%3A%22Shukla%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22T.%20Charles%22%2C%22lastName%22%3A%22Clancy%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222015%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T07%3A53%3A51Z%22%7D%7D%2C%7B%22key%22%3A%22H6C6WZ7W%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Hassan%20and%20Holt%22%2C%22parsedDate%22%3A%222004-11%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BHassan%2C%20A.%20E.%2C%20%26amp%3B%20Holt%2C%20R.%20C.%20%282004%29.%20The%20Small%20World%20of%20Software%20Reverse%20Engineering.%20%26lt%3Bi%26gt%3B11th%20Working%20Conference%20on%20Reverse%20Engineering%26lt%3B%5C%2Fi%26gt%3B%2C%20278%26%23x2013%3B283.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1109%5C%2FWCRE.2004.37%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1109%5C%2FWCRE.2004.37%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22The%20Small%20World%20of%20Software%20Reverse%20Engineering%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22A.E.%22%2C%22lastName%22%3A%22Hassan%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22R.C.%22%2C%22lastName%22%3A%22Holt%22%7D%5D%2C%22abstractNote%22%3A%22Research%20in%20maintenance%20and%20reengineering%20has%20flourished%20and%20evolved%20into%20a%20central%20part%20of%20software%20engineering%20research%20worldwide.%20We%20have%20a%20look%20at%20this%20research%20community%20through%20the%20publications%20of%20its%20members%20in%20several%20international%20conferences.%20We%20analyze%20our%20results%20using%20various%20graph%20and%20text%20mining%20techniques.%20We%20contrast%20our%20findings%20to%20other%20research%20communities.%22%2C%22date%22%3A%22November%202004%22%2C%22proceedingsTitle%22%3A%2211th%20Working%20Conference%20on%20Reverse%20Engineering%22%2C%22conferenceName%22%3A%2211th%20Working%20Conference%20on%20Reverse%20Engineering%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%2210.1109%5C%2FWCRE.2004.37%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T07%3A17%3A36Z%22%7D%7D%2C%7B%22key%22%3A%22H39KZSGC%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Tonella%20et%20al.%22%2C%22parsedDate%22%3A%222007-10-01%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BTonella%2C%20P.%2C%20Torchiano%2C%20M.%2C%20Du%20Bois%2C%20B.%2C%20%26amp%3B%20Syst%26%23xE4%3B%2C%20T.%20%282007%29.%20Empirical%20Studies%20in%20Reverse%20Engineering%3A%20State%20of%20the%20Art%20and%20Future%20Trends.%20%26lt%3Bi%26gt%3BEmpirical%20Software%20Engineering%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B12%26lt%3B%5C%2Fi%26gt%3B%285%29%2C%20551%26%23x2013%3B571.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2Fs10664-007-9037-5%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2Fs10664-007-9037-5%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Empirical%20Studies%20in%20Reverse%20Engineering%3A%20State%20of%20the%20Art%20and%20Future%20Trends%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Paolo%22%2C%22lastName%22%3A%22Tonella%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Marco%22%2C%22lastName%22%3A%22Torchiano%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Bart%22%2C%22lastName%22%3A%22Du%20Bois%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Tarja%22%2C%22lastName%22%3A%22Syst%5Cu00e4%22%7D%5D%2C%22abstractNote%22%3A%22Starting%20with%20the%20aim%20of%20modernizing%20legacy%20systems%2C%20often%20written%20in%20old%20programming%20languages%2C%20reverse%20engineering%20has%20extended%20its%20applicability%20to%20virtually%20every%20kind%20of%20software%20system.%20Moreover%2C%20the%20methods%20originally%20designed%20to%20recover%20a%20diagrammatic%2C%20high-level%20view%20of%20the%20target%20system%20have%20been%20extended%20to%20address%20several%20other%20problems%20faced%20by%20programmers%20when%20they%20need%20to%20understand%20and%20modify%20existing%20software.%20The%20authors%5Cu2019%20position%20is%20that%20the%20next%20stage%20of%20development%20for%20this%20discipline%20will%20necessarily%20be%20based%20on%20empirical%20evaluation%20of%20methods.%20In%20fact%2C%20this%20evaluation%20is%20required%20to%20gain%20knowledge%20about%20the%20actual%20effects%20of%20applying%20a%20given%20approach%2C%20as%20well%20as%20to%20convince%20the%20end%20users%20of%20the%20positive%20cost%5Cu2013benefit%20trade%20offs.%20The%20contribution%20of%20this%20paper%20to%20the%20state%20of%20the%20art%20is%20a%20roadmap%20for%20the%20future%20research%20in%20the%20field%2C%20which%20includes%3A%20clarifying%20the%20scope%20of%20investigation%2C%20defining%20a%20reference%20taxonomy%2C%20and%20adopting%20a%20common%20framework%20for%20the%20execution%20of%20the%20experiments.%22%2C%22date%22%3A%222007-10-01%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1007%5C%2Fs10664-007-9037-5%22%2C%22ISSN%22%3A%221573-7616%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2Fs10664-007-9037-5%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T07%3A17%3A31Z%22%7D%7D%2C%7B%22key%22%3A%22XIW5G74P%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Lungu%22%2C%22parsedDate%22%3A%222009%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BLungu%2C%20M.%20F.%20%282009%29.%20%26lt%3Bi%26gt%3BReverse%20Engineering%20Software%20Ecosystems%26lt%3B%5C%2Fi%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22thesis%22%2C%22title%22%3A%22Reverse%20Engineering%20Software%20Ecosystems%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Mircea%20F.%22%2C%22lastName%22%3A%22Lungu%22%7D%5D%2C%22abstractNote%22%3A%22Reverse%20engineering%20is%20an%20active%20area%20of%20research%20concerned%20with%20the%20development%20of%20techniques%20and%20tools%20that%20support%20the%20understanding%20of%20software%20systems.%20All%20the%20techniques%20that%20were%20pro-%20posed%20until%20now%20study%20individual%20systems%20in%20isolation.%20However%2C%20software%20systems%20are%20seldom%20developed%20in%20isolation%3B%20instead%2C%20they%20are%20developed%20together%20with%20other%20projects%20in%20the%20wider%20context%20of%20an%20organization.%20We%20call%20the%20collection%20of%20projects%20that%20are%20developed%20in%20such%20a%20con-%20text%20a%20software%20ecosystem.%20Understanding%20the%20code%20base%2C%20the%20inter-project%20relationships%20and%20the%20emergent%20social%20structure%20of%20an%20ecosystem%20is%20critical%20for%20the%20efficient%20functioning%20of%20the%20organiza-%20tion.%20In%20this%20thesis%20we%20propose%20ecosystem%20reverse%20engineering%20as%20a%20technique%20for%20ecosystem%20under-%20standing.%20We%20then%20introduce%20Revenge%2C%20a%20methodology%20for%20reverse%20engineering%20entire%20software%20ecosystems%2C%20we%20present%20in%20detail%20multiple%20steps%20of%20the%20process%2C%20we%20provide%20tools%20that%20support%20the%20methodology%2C%20and%20we%20validate%20both%20the%20methodology%20and%20tools%20on%20multiple%20case%20studies.Revenge%20is%20based%20on%20analyzing%20the%20super-repository%20associated%20with%20an%20ecosystem%20and%20gen-%20erating%20ecosystem%20viewpoints%2C%20visual%20representations%20that%20capture%20complementary%20aspects%20of%20the%20ecosystem.%20The%20viewpoints%20can%20be%20either%20holistic%20and%20present%20the%20entire%20ecosystem%20as%20a%20whole%2C%20or%20focused%20and%20present%20a%20single%20component%20of%20the%20ecosystem%20in%20the%20broader%20context.%20The%20viewpoints%20are%20interactive%20and%20a%20user%20can%20navigate%20between%20them%20during%20the%20analysis%20process.%20One%20essential%20type%20of%20exploration%20is%20vertical%20navigation%2C%20which%20allows%20zooming%20in%20on%20a%20single%20project%20in%20the%20ecosystem%2C%20and%20provides%20a%20bridge%20between%20ecosystem%20level%20analysis%20and%20single-system%20analysis%2C%20in%20our%20case%2C%20architecture%20recovery.%20The%20Revenge%20methodology%20includes%20architecture%20recovery%20as%20a%20sub-%20process%20whose%20goal%20is%20to%20generate%20architectural%20views%20of%20the%20individual%20systems%20when%20this%20is%20necessary%20for%20ecosystem%20understanding.%20Since%20generating%20architectural%20views%20can%20not%20be%20performed%20in%20a%20fully%20automated%20manner%2C%20we%20introduce%20two%20techniques%20that%20increase%20the%20degree%20of%20automation%20of%20the%20process.%20First%20we%20annotate%20possible%20exploration%20paths%20based%20on%20the%20classification%20of%20modules%20in%20a%20set%20of%20structural%20patterns.%20Second%20we%20automate%20the%20filtering%20of%20dependencies%20in%20the%20architectural%20views%20based%20on%20the%20classification%20of%20the%20inter-module%20dependencies%20in%20a%20set%20of%20evolution%20patterns.%20Once%20an%20architectural%20view%20of%20a%20system%20is%20obtained%2C%20it%20can%20be%20enriched%20with%20information%20that%20regards%20the%20interaction%20of%20the%20system%20with%20the%20entire%20ecosystem.%20To%20validate%20our%20contributions%20we%20applied%20our%20tools%20and%20techniques%20on%20a%20set%20of%20ecosystem%20case%20studies%20that%20belong%20to%20one%20industrial%20software%20house%2C%20two%20academic%20research%20groups%2C%20and%20one%20open-source%20community.%20At%20the%20architectural%20level%2C%20we%20validated%20our%20techniques%20on%20several%20well-%20known%20open%20source%20software%20systems%22%2C%22thesisType%22%3A%22%22%2C%22university%22%3A%22%22%2C%22date%22%3A%222009%22%2C%22language%22%3A%22eng%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T07%3A17%3A28Z%22%7D%7D%2C%7B%22key%22%3A%22D5F8CEKP%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Treude%20et%20al.%22%2C%22parsedDate%22%3A%222011-10%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BTreude%2C%20C.%2C%20Filho%2C%20F.%20F.%2C%20Storey%2C%20M.-A.%2C%20%26amp%3B%20Salois%2C%20M.%20%282011%29.%20An%20Exploratory%20Study%20of%20Software%20Reverse%20Engineering%20in%20a%20Security%20Context.%20%26lt%3Bi%26gt%3B2011%2018th%20Working%20Conference%20on%20Reverse%20Engineering%26lt%3B%5C%2Fi%26gt%3B%2C%20184%26%23x2013%3B188.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1109%5C%2FWCRE.2011.30%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1109%5C%2FWCRE.2011.30%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22An%20Exploratory%20Study%20of%20Software%20Reverse%20Engineering%20in%20a%20Security%20Context%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Christoph%22%2C%22lastName%22%3A%22Treude%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Fernando%20Figueira%22%2C%22lastName%22%3A%22Filho%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Margaret-Anne%22%2C%22lastName%22%3A%22Storey%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Martin%22%2C%22lastName%22%3A%22Salois%22%7D%5D%2C%22abstractNote%22%3A%22Illegal%20cyberspace%20activities%20are%20increasing%20rapidly%20and%20many%20software%20engineers%20are%20using%20reverse%20engineering%20methods%20to%20respond%20to%20attacks.%20The%20security-sensitive%20nature%20of%20these%20tasks%2C%20such%20as%20the%20understanding%20of%20malware%20or%20the%20decryption%20of%20encrypted%20content%2C%20brings%20unique%20challenges%20to%20reverse%20engineering%3A%20work%20has%20to%20be%20done%20offline%2C%20files%20can%20rarely%20be%20shared%2C%20time%20pressure%20is%20immense%2C%20and%20there%20is%20a%20lack%20of%20tool%20and%20process%20support%20for%20capturing%20and%20sharing%20the%20knowledge%20obtained%20while%20trying%20to%20understand%20plain%20assembly%20code.%20To%20help%20us%20gain%20an%20understanding%20of%20this%20reverse%20engineering%20work%2C%20we%20report%20on%20an%20exploratory%20study%20done%20in%20a%20security%20context%20at%20a%20research%20and%20development%20government%20organization%20to%20explore%20their%20work%20processes%2C%20tools%2C%20and%20artifacts.%20In%20this%20paper%2C%20we%20identify%20challenges%2C%20such%20as%20the%20management%20and%20navigation%20of%20a%20myriad%20of%20artifacts%2C%20and%20we%20conclude%20by%20offering%20suggestions%20for%20tool%20and%20process%20improvements.%22%2C%22date%22%3A%22October%202011%22%2C%22proceedingsTitle%22%3A%222011%2018th%20Working%20Conference%20on%20Reverse%20Engineering%22%2C%22conferenceName%22%3A%222011%2018th%20Working%20Conference%20on%20Reverse%20Engineering%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%2210.1109%5C%2FWCRE.2011.30%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-06-18T07%3A17%3A02Z%22%7D%7D%2C%7B%22key%22%3A%223FQM9DEV%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Gehl%22%2C%22parsedDate%22%3A%222017%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BGehl%2C%20R.%20W.%20%282017%29.%20%28Critical%29%20Reverse%20Engineering%20and%20Genealogy.%20%26lt%3Bi%26gt%3BLe%20Foucauldien%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B3%26lt%3B%5C%2Fi%26gt%3B%281%29.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22%28Critical%29%20Reverse%20Engineering%20and%20Genealogy%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Robert%20W.%22%2C%22lastName%22%3A%22Gehl%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222017%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22Z6AH4H83%22%2C%22CJ62DUS2%22%2C%22K6E9XXTP%22%2C%22MS8JZI5I%22%2C%22Q45SJPG4%22%5D%2C%22dateModified%22%3A%222021-05-19T08%3A03%3A38Z%22%7D%7D%2C%7B%22key%22%3A%22SG8KHGL6%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Shahbaz%22%2C%22parsedDate%22%3A%222012%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BShahbaz%2C%20M.%20%282012%29.%20%26lt%3Bi%26gt%3BReverse%20Engineering%20and%20Testing%20of%20Black-Box%20Software%20Components%26lt%3B%5C%2Fi%26gt%3B.%20LAP%20LAMBERT%20ACADEMIC%20PUBL.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22book%22%2C%22title%22%3A%22Reverse%20Engineering%20and%20Testing%20of%20Black-Box%20Software%20Components%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Muzammil%22%2C%22lastName%22%3A%22Shahbaz%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222012%22%2C%22language%22%3A%22English%22%2C%22ISBN%22%3A%22978-3-659-14073-0%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-05-17T16%3A35%3A53Z%22%7D%7D%2C%7B%22key%22%3A%22G5M5P3GZ%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Halas%22%2C%22parsedDate%22%3A%222018-12-18%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BHalas%2C%20J.%20%282018%29.%20Marxian%20%26%23x201C%3BAbstraction%26%23x201D%3B%20and%20Contemporary%20Philosophy%20of%20Science.%20%26lt%3Bi%26gt%3BEpistemology%20%26amp%3B%20Philosophy%20of%20Science%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B55%26lt%3B%5C%2Fi%26gt%3B%283%29%2C%20122%26%23x2013%3B136.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fjournal.iph.ras.ru%5C%2Farticle%5C%2Fview%5C%2F2064%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fjournal.iph.ras.ru%5C%2Farticle%5C%2Fview%5C%2F2064%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Marxian%20%5Cu201cAbstraction%5Cu201d%20and%20Contemporary%20Philosophy%20of%20Science%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Juraj%22%2C%22lastName%22%3A%22Halas%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222018%5C%2F12%5C%2F18%22%2C%22language%22%3A%22ru%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%222311-7133%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fjournal.iph.ras.ru%5C%2Farticle%5C%2Fview%5C%2F2064%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-05-16T16%3A28%3A59Z%22%7D%7D%2C%7B%22key%22%3A%22LQB42TIP%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Porter%22%2C%22parsedDate%22%3A%222009-06-01%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BPorter%2C%20T.%20M.%20%282009%29.%20How%20Science%20Became%20Technical.%20%26lt%3Bi%26gt%3BIsis%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B100%26lt%3B%5C%2Fi%26gt%3B%282%29%2C%20292%26%23x2013%3B309.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1086%5C%2F599552%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1086%5C%2F599552%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22How%20Science%20Became%20Technical%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Theodore%5Cu00a0M.%22%2C%22lastName%22%3A%22Porter%22%7D%5D%2C%22abstractNote%22%3A%22Not%20until%20the%20twentieth%20century%20did%20science%20come%20to%20be%20regarded%20as%20fundamentally%20technical%20in%20nature.%20A%20technical%20field%2C%20after%20all%2C%20meant%20not%20just%20a%20difficult%20one%2C%20but%20one%20relying%20on%20concepts%20and%20vocabulary%20that%20matter%20only%20to%20specialists.%20The%20alternative%2C%20to%20identify%20science%20with%20an%20ideal%20of%20public%20reason%2C%20attained%20its%20peak%20of%20influence%20in%20the%20late%20nineteenth%20century.%20While%20the%20scale%20and%20applicability%20of%20science%20advanced%20enormously%20after%201900%2C%20scientists%20have%20more%20and%20more%20preferred%20the%20detached%20objectivity%20of%20service%20to%20bureaucratic%20experts%20over%20the%20cultivation%20of%20an%20engaged%20public.%20This%20reshaping%20of%20science%2C%20which%20has%20been%20both%20celebrated%20and%20condemned%2C%20provided%20a%20stimulus%20to%20the%20incipient%20field%20of%20history%20of%20science%2C%20and%20it%20remains%20a%20key%20historical%20problem.%22%2C%22date%22%3A%22June%201%2C%202009%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%2210.1086%5C%2F599552%22%2C%22ISSN%22%3A%220021-1753%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.journals.uchicago.edu%5C%2Fdoi%5C%2Fabs%5C%2F10.1086%5C%2F599552%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%2C%22K6E9XXTP%22%2C%22MS8JZI5I%22%5D%2C%22dateModified%22%3A%222021-05-16T15%3A35%3A43Z%22%7D%7D%2C%7B%22key%22%3A%2238MTCF33%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Hall%22%2C%22parsedDate%22%3A%221992%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BHall%2C%20P.%20A.%20%28Ed.%29.%20%281992%29.%20%26lt%3Bi%26gt%3BSoftware%20Reuse%20and%20Reverse%20Engineering%20in%20Practice%26lt%3B%5C%2Fi%26gt%3B%20%281.%20ed%29.%20Chapman%20%26amp%3B%20Hall.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22book%22%2C%22title%22%3A%22Software%20Reuse%20and%20Reverse%20Engineering%20in%20Practice%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Patrick%20A.%22%2C%22lastName%22%3A%22Hall%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%221992%22%2C%22language%22%3A%22%22%2C%22ISBN%22%3A%22978-0-412-39980-0%20978-0-442-31409-5%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-05-16T11%3A22%3A15Z%22%7D%7D%2C%7B%22key%22%3A%22QUY783V4%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Ziewitz%22%2C%22parsedDate%22%3A%222013%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BZiewitz%2C%20M.%20%282013%29.%20%26lt%3Bi%26gt%3BWhat%20Does%20Transparency%20Conceal%3F%26lt%3B%5C%2Fi%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22manuscript%22%2C%22title%22%3A%22What%20Does%20Transparency%20Conceal%3F%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Malte%22%2C%22lastName%22%3A%22Ziewitz%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22manuscriptType%22%3A%22%22%2C%22date%22%3A%222013%22%2C%22language%22%3A%22en%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-05-16T11%3A17%3A52Z%22%7D%7D%2C%7B%22key%22%3A%22PB6VC7F6%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Henrard%20et%20al.%22%2C%22parsedDate%22%3A%221998%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BHenrard%2C%20J.%2C%20Englebert%2C%20V.%2C%20Hick%2C%20J.-M.%2C%20Roland%2C%20D.%2C%20%26amp%3B%20Hainaut%2C%20J.-L.%20%281998%29.%20Program%20Understanding%20in%20Databases%20Reverse%20Engineering.%20In%20G.%20Quirchmayr%2C%20E.%20Schweighofer%2C%20%26amp%3B%20T.%20J.%20M.%20Bench-Capon%20%28Eds.%29%2C%20%26lt%3Bi%26gt%3BDatabase%20and%20Expert%20Systems%20Applications%26lt%3B%5C%2Fi%26gt%3B%20%28pp.%2070%26%23x2013%3B79%29.%20Springer.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2FBFb0054469%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2FBFb0054469%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22Program%20Understanding%20in%20Databases%20Reverse%20Engineering%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22J.%22%2C%22lastName%22%3A%22Henrard%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22V.%22%2C%22lastName%22%3A%22Englebert%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22J-M.%22%2C%22lastName%22%3A%22Hick%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22D.%22%2C%22lastName%22%3A%22Roland%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22J-L.%22%2C%22lastName%22%3A%22Hainaut%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Gerald%22%2C%22lastName%22%3A%22Quirchmayr%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Erich%22%2C%22lastName%22%3A%22Schweighofer%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Trevor%20J.M.%22%2C%22lastName%22%3A%22Bench-Capon%22%7D%5D%2C%22abstractNote%22%3A%22The%20main%20argument%20of%20the%20paper%20is%20that%20database%20understanding%20%28or%20reverse%20engineering%29%20requires%20sophisticated%20program%20understanding%20techniques%2C%20and%20conversely.%20Database%20reverse%20engineering%20%28DBRE%29%20can%20be%20carried%20out%20following%20a%20generic%20methodology%2C%20one%20of%20the%20phases%20of%20which%20consists%20in%20eliciting%20all%20the%20implicit%20and%20untranslated%20data%20structures%20and%20constraints.%20Evidences%20of%20these%20hidden%20constructs%20can%20be%20found%20by%20analysing%20how%20the%20programs%20use%20and%20update%20the%20data.%20Hence%20the%20need%20for%20program%20analysis%20techniques%20such%20as%20searching%20for%20clich%5Cu00e9s%2C%20dependency%20analysis%2C%20program%20slicing%20and%20synthetic%20views.%20The%20paper%20explains%20how%20these%20techniques%20contribute%20to%20DBRE%2C%20and%20describes%20DB-MAIN%2C%20a%20programmable%20and%20extensible%20CASE%20environment%20that%20supports%20DBRE%20through%20program%20understanding%20techniques.%22%2C%22date%22%3A%221998%22%2C%22proceedingsTitle%22%3A%22Database%20and%20Expert%20Systems%20Applications%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1007%5C%2FBFb0054469%22%2C%22ISBN%22%3A%22978-3-540-68060-4%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-05-16T11%3A17%3A49Z%22%7D%7D%2C%7B%22key%22%3A%22TVNQBX3V%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22M%5Cu00fcller%20et%20al.%22%2C%22parsedDate%22%3A%222000-05-01%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BM%26%23xFC%3Bller%2C%20H.%20A.%2C%20Jahnke%2C%20J.%20H.%2C%20Smith%2C%20D.%20B.%2C%20Storey%2C%20M.-A.%2C%20Tilley%2C%20S.%20R.%2C%20%26amp%3B%20Wong%2C%20K.%20%282000%29.%20Reverse%20Engineering%3A%20A%20Roadmap.%20%26lt%3Bi%26gt%3BProceedings%20of%20the%20Conference%20on%20The%20Future%20of%20Software%20Engineering%26lt%3B%5C%2Fi%26gt%3B%2C%2047%26%23x2013%3B60.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1145%5C%2F336512.336526%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1145%5C%2F336512.336526%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22Reverse%20Engineering%3A%20A%20Roadmap%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Hausi%20A.%22%2C%22lastName%22%3A%22M%5Cu00fcller%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jens%20H.%22%2C%22lastName%22%3A%22Jahnke%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Dennis%20B.%22%2C%22lastName%22%3A%22Smith%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Margaret-Anne%22%2C%22lastName%22%3A%22Storey%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Scott%20R.%22%2C%22lastName%22%3A%22Tilley%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Kenny%22%2C%22lastName%22%3A%22Wong%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%22May%201%2C%202000%22%2C%22proceedingsTitle%22%3A%22Proceedings%20of%20the%20Conference%20on%20The%20Future%20of%20Software%20Engineering%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%2210.1145%5C%2F336512.336526%22%2C%22ISBN%22%3A%22978-1-58113-253-3%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1145%5C%2F336512.336526%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-05-16T11%3A17%3A46Z%22%7D%7D%2C%7B%22key%22%3A%22823VYMY3%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Quadir%20et%20al.%22%2C%22parsedDate%22%3A%222016-04-13%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BQuadir%2C%20S.%20E.%2C%20Chen%2C%20J.%2C%20Forte%2C%20D.%2C%20Asadizanjani%2C%20N.%2C%20Shahbazmohamadi%2C%20S.%2C%20Wang%2C%20L.%2C%20Chandy%2C%20J.%2C%20%26amp%3B%20Tehranipoor%2C%20M.%20%282016%29.%20A%20Survey%20on%20Chip%20to%20System%20Reverse%20Engineering.%20%26lt%3Bi%26gt%3BACM%20Journal%20on%20Emerging%20Technologies%20in%20Computing%20Systems%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B13%26lt%3B%5C%2Fi%26gt%3B%281%29%2C%206%3A1-6%3A34.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1145%5C%2F2755563%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1145%5C%2F2755563%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22A%20Survey%20on%20Chip%20to%20System%20Reverse%20Engineering%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Shahed%20E.%22%2C%22lastName%22%3A%22Quadir%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Junlin%22%2C%22lastName%22%3A%22Chen%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Domenic%22%2C%22lastName%22%3A%22Forte%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Navid%22%2C%22lastName%22%3A%22Asadizanjani%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sina%22%2C%22lastName%22%3A%22Shahbazmohamadi%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Lei%22%2C%22lastName%22%3A%22Wang%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22John%22%2C%22lastName%22%3A%22Chandy%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Mark%22%2C%22lastName%22%3A%22Tehranipoor%22%7D%5D%2C%22abstractNote%22%3A%22The%20reverse%20engineering%20%28RE%29%20of%20electronic%20chips%20and%20systems%20can%20be%20used%20with%20honest%20and%20dishonest%20intentions.%20To%20inhibit%20RE%20for%20those%20with%20dishonest%20intentions%20%28e.g.%2C%20piracy%20and%20counterfeiting%29%2C%20it%20is%20important%20that%20the%20community%20is%20aware%20of%20the%20state-of-the-art%20capabilities%20available%20to%20attackers%20today.%20In%20this%20article%2C%20we%20will%20be%20presenting%20a%20survey%20of%20RE%20and%20anti-RE%20techniques%20on%20the%20chip%2C%20board%2C%20and%20system%20levels.%20We%20also%20highlight%20the%20current%20challenges%20and%20limitations%20of%20anti-RE%20and%20the%20research%20needed%20to%20overcome%20them.%20This%20survey%20should%20be%20of%20interest%20to%20both%20governmental%20and%20industrial%20bodies%20whose%20critical%20systems%20and%20intellectual%20property%20%28IP%29%20require%20protection%20from%20foreign%20enemies%20and%20counterfeiters%20who%20possess%20advanced%20RE%20capabilities.%22%2C%22date%22%3A%22April%2013%2C%202016%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%2210.1145%5C%2F2755563%22%2C%22ISSN%22%3A%221550-4832%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1145%5C%2F2755563%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%2C%22J3K55JUK%22%5D%2C%22dateModified%22%3A%222021-05-16T11%3A11%3A52Z%22%7D%7D%2C%7B%22key%22%3A%223J66BP9J%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22K.N.%5Cu00b7%5Cu5965%5Cu6258%20%28%5Cu7f8e%29%20and%20Otto%22%2C%22parsedDate%22%3A%222003%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BK.N.%26%23xB7%3B%26%23x5965%3B%26%23x6258%3B%20%28%26%23x7F8E%3B%29%2C%20%26amp%3B%20Otto%2C%20K.%20N.%20%282003%29.%20%26lt%3Bi%26gt%3BProduct%20Design%3A%20Techniques%20in%20Reverse%20Engineering%20and%20New%20Product%20Development%26lt%3B%5C%2Fi%26gt%3B.%20%26%23x6E05%3B%26%23x534E%3B%26%23x5927%3B%26%23x5B66%3B%26%23x51FA%3B%26%23x7248%3B%26%23x793E%3B%26%23x6709%3B%26%23x9650%3B%26%23x516C%3B%26%23x53F8%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22book%22%2C%22title%22%3A%22Product%20Design%3A%20Techniques%20in%20Reverse%20Engineering%20and%20New%20Product%20Development%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22K.N.%5Cu00b7%5Cu5965%5Cu6258%20%28%5Cu7f8e%29%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Kevin%20N.%22%2C%22lastName%22%3A%22Otto%22%7D%5D%2C%22abstractNote%22%3A%22%5Cu8d23%5Cu4efb%5Cu8005%5Cu8bd1%5Cu540d%3A%5Cu5965%5Cu6258%5Cu3002%22%2C%22date%22%3A%222003%22%2C%22language%22%3A%22en%22%2C%22ISBN%22%3A%22978-7-302-07048-1%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-05-16T11%3A11%3A47Z%22%7D%7D%2C%7B%22key%22%3A%2279BF5CHY%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Torrance%20and%20James%22%2C%22parsedDate%22%3A%222009%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BTorrance%2C%20R.%2C%20%26amp%3B%20James%2C%20D.%20%282009%29.%20The%20State-of-the-Art%20in%20IC%20Reverse%20Engineering.%20In%20C.%20Clavier%20%26amp%3B%20K.%20Gaj%20%28Eds.%29%2C%20%26lt%3Bi%26gt%3BCryptographic%20Hardware%20and%20Embedded%20Systems%20-%20CHES%202009%26lt%3B%5C%2Fi%26gt%3B%20%28pp.%20363%26%23x2013%3B381%29.%20Springer.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2F978-3-642-04138-9_26%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2F978-3-642-04138-9_26%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22The%20State-of-the-Art%20in%20IC%20Reverse%20Engineering%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Randy%22%2C%22lastName%22%3A%22Torrance%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Dick%22%2C%22lastName%22%3A%22James%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Christophe%22%2C%22lastName%22%3A%22Clavier%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Kris%22%2C%22lastName%22%3A%22Gaj%22%7D%5D%2C%22abstractNote%22%3A%22This%20paper%20gives%20an%20overview%20of%20the%20place%20of%20reverse%20engineering%20%28RE%29%20in%20the%20semiconductor%20industry%2C%20and%20the%20techniques%20used%20to%20obtain%20information%20from%20semiconductor%20products.The%20continuous%20drive%20of%20Moore%5Cu2019s%20law%20to%20increase%20the%20integration%20level%20of%20silicon%20chips%20has%20presented%20major%20challenges%20to%20the%20reverse%20engineer%2C%20obsolescing%20simple%20teardowns%2C%20and%20demanding%20the%20adoption%20of%20new%20and%20more%20sophisticated%20technology%20to%20analyse%20chips.%20Hardware%20encryption%20embedded%20in%20chips%20adds%20a%20whole%20other%20level%20of%20difficulty%20to%20IC%20analysis.This%20paper%20covers%20product%20teardowns%2C%20and%20discusses%20the%20techniques%20used%20for%20system-level%20analysis%2C%20both%20hardware%20and%20software%3B%20circuit%20extraction%2C%20taking%20the%20chip%20down%20to%20the%20transistor%20level%2C%20and%20working%20back%20up%20through%20the%20interconnects%20to%20create%20schematics%3B%20and%20process%20analysis%2C%20looking%20at%20how%20a%20chip%20is%20made%2C%20and%20what%20it%20is%20made%20of.%20Examples%20are%20also%20given%20of%20each%20type%20of%20RE.%20The%20paper%20concludes%20with%20a%20case%20study%20of%20the%20analysis%20of%20an%20IC%20with%20embedded%20encryption%20hardware.%22%2C%22date%22%3A%222009%22%2C%22proceedingsTitle%22%3A%22Cryptographic%20Hardware%20and%20Embedded%20Systems%20-%20CHES%202009%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1007%5C%2F978-3-642-04138-9_26%22%2C%22ISBN%22%3A%22978-3-642-04138-9%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-05-16T11%3A11%3A38Z%22%7D%7D%2C%7B%22key%22%3A%22N72SH7FM%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Diakopoulos%22%2C%22parsedDate%22%3A%222013-10-03%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BDiakopoulos%2C%20N.%20%282013%2C%20October%203%29.%20%26lt%3Bi%26gt%3BRage%20Against%20the%20Algorithms%26lt%3B%5C%2Fi%26gt%3B.%20The%20Atlantic.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fwww.theatlantic.com%5C%2Ftechnology%5C%2Farchive%5C%2F2013%5C%2F10%5C%2Frage-against-the-algorithms%5C%2F280255%5C%2F%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fwww.theatlantic.com%5C%2Ftechnology%5C%2Farchive%5C%2F2013%5C%2F10%5C%2Frage-against-the-algorithms%5C%2F280255%5C%2F%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Rage%20Against%20the%20Algorithms%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nicholas%22%2C%22lastName%22%3A%22Diakopoulos%22%7D%5D%2C%22abstractNote%22%3A%22How%20can%20we%20know%20the%20biases%20of%20a%20piece%20of%20software%3F%20By%20reverse%20engineering%20it%2C%20of%20course.%22%2C%22date%22%3A%222013-10-03T21%3A14%3A21Z%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.theatlantic.com%5C%2Ftechnology%5C%2Farchive%5C%2F2013%5C%2F10%5C%2Frage-against-the-algorithms%5C%2F280255%5C%2F%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-05-16T11%3A10%3A35Z%22%7D%7D%2C%7B%22key%22%3A%227AX2PUQA%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Keller%20et%20al.%22%2C%22parsedDate%22%3A%221999%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BKeller%2C%20R.%20K.%2C%20Schauer%2C%20R.%2C%20Robitaille%2C%20S.%2C%20%26amp%3B%20Pag%26%23xE9%3B%2C%20P.%20%281999%29.%20Pattern-Based%20Reverse-Engineering%20of%20Design%20Components.%20%26lt%3Bi%26gt%3BProceedings%20of%20the%201999%20International%20Conference%20on%20Software%20Engineering%20%28IEEE%20Cat.%20No.%2099CB37002%29%26lt%3B%5C%2Fi%26gt%3B%2C%20226%26%23x2013%3B235.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22Pattern-Based%20Reverse-Engineering%20of%20Design%20Components%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Rudolf%20K.%22%2C%22lastName%22%3A%22Keller%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Reinhard%22%2C%22lastName%22%3A%22Schauer%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22S%5Cu00e9bastien%22%2C%22lastName%22%3A%22Robitaille%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Patrick%22%2C%22lastName%22%3A%22Pag%5Cu00e9%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%221999%22%2C%22proceedingsTitle%22%3A%22Proceedings%20of%20the%201999%20International%20Conference%20on%20Software%20Engineering%20%28IEEE%20Cat.%20No.%2099CB37002%29%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-05-16T07%3A25%3A38Z%22%7D%7D%2C%7B%22key%22%3A%22TVPDMFMW%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Kahveci%20and%20Okutmu%5Cu015f%22%2C%22parsedDate%22%3A%222015%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BKahveci%2C%20A.%2C%20%26amp%3B%20Okutmu%26%23x15F%3B%2C%20E.%20%282015%29.%20Examining%20the%20Effects%20of%20the%20Manufacturing%20Costs%20Using%20Teardown%20Analysis%20to%20Minimize%20the%20Costs.%20%26lt%3Bi%26gt%3BPaper%20Presented%20at%20the%20Inter-National%20Conference%20Challenges%20in%20Business%20and%20Economics%3A%20Growth%2C%20Competitive-Ness%2C%20Innovation%2C%20University%20of%20Ni%26%23x161%3B%2C%20October%2016.%26lt%3B%5C%2Fi%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22Examining%20the%20Effects%20of%20the%20Manufacturing%20Costs%20Using%20Teardown%20Analysis%20to%20Minimize%20the%20Costs%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ata%22%2C%22lastName%22%3A%22Kahveci%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Erc%5Cu00fcment%22%2C%22lastName%22%3A%22Okutmu%5Cu015f%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222015%22%2C%22proceedingsTitle%22%3A%22Paper%20presented%20at%20the%20inter-national%20conference%20Challenges%20in%20Business%20and%20Economics%3A%20Growth%2C%20Competitive-ness%2C%20Innovation%2C%20University%20of%20Ni%5Cu0161%2C%20October%2016.%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-05-16T07%3A25%3A05Z%22%7D%7D%2C%7B%22key%22%3A%22B4WCRVX8%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Tegner%20et%20al.%22%2C%22parsedDate%22%3A%222003-05-13%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BTegner%2C%20J.%2C%20Yeung%2C%20M.%20K.%20S.%2C%20Hasty%2C%20J.%2C%20%26amp%3B%20Collins%2C%20J.%20J.%20%282003%29.%20Reverse%20Engineering%20Gene%20Networks%3A%20Integrating%20Genetic%20Perturbations%20with%20Dynamical%20Modeling.%20%26lt%3Bi%26gt%3BProceedings%20of%20the%20National%20Academy%20of%20Sciences%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B100%26lt%3B%5C%2Fi%26gt%3B%2810%29%2C%205944%26%23x2013%3B5949.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1073%5C%2Fpnas.0933416100%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1073%5C%2Fpnas.0933416100%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Reverse%20Engineering%20Gene%20Networks%3A%20Integrating%20Genetic%20Perturbations%20with%20Dynamical%20Modeling%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22J.%22%2C%22lastName%22%3A%22Tegner%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22M.%20K.%20S.%22%2C%22lastName%22%3A%22Yeung%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22J.%22%2C%22lastName%22%3A%22Hasty%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22J.%20J.%22%2C%22lastName%22%3A%22Collins%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222003-05-13%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1073%5C%2Fpnas.0933416100%22%2C%22ISSN%22%3A%220027-8424%2C%201091-6490%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fwww.pnas.org%5C%2Fcgi%5C%2Fdoi%5C%2F10.1073%5C%2Fpnas.0933416100%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-05-16T07%3A21%3A01Z%22%7D%7D%2C%7B%22key%22%3A%224IAGA7U3%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Torrance%20and%20James%22%2C%22parsedDate%22%3A%222007%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BTorrance%2C%20R.%2C%20%26amp%3B%20James%2C%20D.%20%282007%29.%20Reverse%20Engineering%20in%20the%20Semiconductor%20Industry.%20%26lt%3Bi%26gt%3B2007%20IEEE%20Custom%20Integrated%20Circuits%20Conference%26lt%3B%5C%2Fi%26gt%3B%2C%20429%26%23x2013%3B436.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1109%5C%2FCICC.2007.4405767%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1109%5C%2FCICC.2007.4405767%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22Reverse%20Engineering%20in%20the%20Semiconductor%20Industry%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Randy%22%2C%22lastName%22%3A%22Torrance%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Dick%22%2C%22lastName%22%3A%22James%22%7D%5D%2C%22abstractNote%22%3A%22The%20intent%20of%20this%20paper%20is%20to%20give%20an%20overview%20of%20the%20place%20of%20reverse%20engineering%20%28RE%29%20in%20the%20semiconductor%20industry%2C%20and%20the%20techniques%20used%20to%20obtain%20information%20from%20semiconductor%20products.%22%2C%22date%22%3A%222007%22%2C%22proceedingsTitle%22%3A%222007%20IEEE%20Custom%20Integrated%20Circuits%20Conference%22%2C%22conferenceName%22%3A%222007%20IEEE%20Custom%20Integrated%20Circuits%20Conference%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1109%5C%2FCICC.2007.4405767%22%2C%22ISBN%22%3A%22978-1-4244-0786-6%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fieeexplore.ieee.org%5C%2Fdocument%5C%2F4405767%5C%2F%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%2C%22J3K55JUK%22%5D%2C%22dateModified%22%3A%222021-05-16T07%3A20%3A25Z%22%7D%7D%2C%7B%22key%22%3A%22HD9KZ3JI%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Schulman%20et%20al.%22%2C%22parsedDate%22%3A%221992%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BSchulman%2C%20A.%2C%20Maxey%2C%20D.%2C%20%26amp%3B%20Pietrek%2C%20M.%20%281992%29.%20%26lt%3Bi%26gt%3BUndocumented%20Windows%26lt%3B%5C%2Fi%26gt%3B.%20Addison-Wesley.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22book%22%2C%22title%22%3A%22Undocumented%20Windows%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Andrew%22%2C%22lastName%22%3A%22Schulman%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22David%22%2C%22lastName%22%3A%22Maxey%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Matt%22%2C%22lastName%22%3A%22Pietrek%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%221992%22%2C%22language%22%3A%22%22%2C%22ISBN%22%3A%22978-0-201-60834-2%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-05-16T07%3A19%3A52Z%22%7D%7D%2C%7B%22key%22%3A%2267C7CNGQ%22%2C%22library%22%3A%7B%22id%22%3A3491593%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Schulman%22%2C%22parsedDate%22%3A%221994%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BSchulman%2C%20A.%20%28Ed.%29.%20%281994%29.%20%26lt%3Bi%26gt%3BUndocumented%20DOS%3A%20a%20programmer%26%23x2019%3Bs%20guide%20to%20reserved%20MS-DOS%20functions%20and%20data%20structures%26lt%3B%5C%2Fi%26gt%3B%20%282nd%20ed%29.%20Addison-Wesley%20Pub.%20Co.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22book%22%2C%22title%22%3A%22Undocumented%20DOS%3A%20a%20programmer%27s%20guide%20to%20reserved%20MS-DOS%20functions%20and%20data%20structures%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Andrew%22%2C%22lastName%22%3A%22Schulman%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%221994%22%2C%22language%22%3A%22%22%2C%22ISBN%22%3A%22978-0-201-63287-3%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22CJ62DUS2%22%5D%2C%22dateModified%22%3A%222021-05-16T07%3A19%3A36Z%22%7D%7D%5D%7D
Wynter, S. (1992). Rethinking “Aesthetics”: Notes Towards a Deciphering Practice. https://monoskop.org/images/9/98/Wynter_Sylvia_1992_Rethinking_Aesthetics_Notes_Towards_a_Deciphering_Practice.pdf
Seaver, N. (2014, January 27). On Reverse Engineering: Looking for the Cultural Work of Engineers. Medium. https://medium.com/anthropology-and-algorithms/on-reverse-engineering-d9f5bae87812
Bryant, A. R. (2012). Understanding How Reverse Engineers Make Sense of Programs from Assembly Language Representations.
Pierce, C. (2005). Reverse Engineering the Ceramic Cooking Pot: Cost and Performance Properties of Plain and Textured Vessels. Journal of Archaeological Method and Theory, 12(2), 117–157.
Queloz, M. (2021). The Practical Origins of Ideas: Genealogy as Conceptual Reverse-Engineering. Oxford University Press.
Lefebvre, C., Rieckhof, G., & Califano, A. (2012). Reverse-Engineering Human Regulatory Networks. Wiley Interdisciplinary Reviews: Systems Biology and Medicine, 4(4), 311–325. https://doi.org/10.1002/wsbm.1159
Paxson, H. (2010). Locating Value in Artisan Cheese: Reverse Engineering Terroir for New-World Landscapes. American Anthropologist, 112(3), 444–457.
Moshenska, G. (2016). Reverse Engineering and the Archaeology of the Modern World. Forum Kritische Archäologie, 5, 16–28.
Bennett, C., Myers, D., Storey, M.-A., German, D. M., Ouellet, D., Salois, M., & Charland, P. (2008). A Survey and Evaluation of Tool Features for Understanding Reverse-Engineered Sequence Diagrams. Journal of Software Maintenance and Evolution: Research and Practice, 20(4), 291–315.
Cowley, J. (2014). Job Analysis Results for Malicious-Code Reverse Engineers: A Case Study. CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST.
Henry, W. C., & Peterson, G. L. (2020). Sensorre: Provenance Support for Software Reverse Engineers. Computers & Security, 95.
Seitz, J. (2009). Gray Hat Python: Python Programming for Hackers and Reverse Engineers. no starch press.
Ducasse, S., & Pollet, D. (2009). Software Architecture Reconstruction: A Process-Oriented Taxonomy. IEEE Transactions on Software Engineering, 35(4), 573–591.
Samuelson, P., & Scotchmer, S. (2002). The Law and Economics of Reverse Engineering. The Yale Law Journal, 111(7), 1575. https://doi.org/10.2307/797533
Muntz, P. A. A., & Richards, R. (1993). A Framework for Reverse Engineering DoD Legacy Information Systems. Proceedings Working Conference on Reverse Engineering.
Votipka, D., Rabin, S., Micinski, K., Foster, J. S., & Mazurek, M. L. (2020). An Observational Investigation of Reverse Engineers’ Processes. 29th USENIX Security Symposium, 1875–1892.
Zuboff, S., Möllers, N., Wood, D. M., & Lyon, D. (2019). Surveillance Capitalism: An Interview with Shoshana Zuboff. Surveillance & Society, 17(1/2), 257–266.
Votipka, D., Rabin, S., Micinski, K., Foster, J. S., & Mazurek, M. L. (2019). An Observational Investigation of Reverse Engineers’ Process and Mental Models. Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 1–6.
Henry, W. T. (2020). Analytic Provenance for Software Reverse Engineers.
Pollet, D., Ducasse, S., Poyet, L., Alloui, I., Cimpan, S., & Verjus, H. (2007). Towards a process-oriented software architecture reconstruction taxonomy. 11th European Conference on Software Maintenance and Reengineering (CSMR’07), 137–148.
Wan, F. (2009). Reverse Engineering of Content as a Task for Finding Usability Problems: An Evaluative Case Study Using the Wikibreathe Tool for Online Creation of Asthma Action Plans [PhD Thesis].
Rafferty, J. (2018). Reverse Engineering Stone Atlatl Dart Points. Lithic Technology, 43(3), 151–165.
Botero, U. J., Wilson, R., Lu, H., Rahman, M. T., Mallaiyan, M. A., Ganji, F., Asadizanjani, N., Tehranipoor, M. M., Woodard, D. L., & Forte, D. (2020). Hardware Trust and Assurance Through Reverse Engineering: A Survey and Outlook from Image Analysis and Machine Learning Perspectives. ArXiv Preprint ArXiv:2002.04210.
Buonamici, F., Carfagni, M., Furferi, R., Governi, L., Lapini, A., & Volpe, Y. (2018). Reverse Engineering Modeling Methods and Tools: A Survey. Computer-Aided Design and Applications, 15(3), 443–464.
Davis, K. H., & Alken, P. H. (2000). Data Reverse Engineering: A Historical Survey. Proceedings Seventh Working Conference on Reverse Engineering, 70–78.
Fyrbiak, M., Strauß, S., Kison, C., Wallat, S., Elson, M., Rummel, N., & Paar, C. (2017). Hardware Reverse Engineering: Overview and Open Challenges. 2017 IEEE 2nd International Verification and Security Workshop (IVSW), 88–94.
Koschke, R. (2003). Software Visualization in Software Maintenance, Reverse Engineering, and Re-Engineering: A Research Survey. Journal of Software Maintenance and Evolution: Research and Practice, 15(2), 87–109.
Narayan, J., Shukla, S. K., & Clancy, T. C. (2015). A Survey of Automatic Protocol Reverse Engineering Tools. ACM Computing Surveys (CSUR), 48(3), 1–26.
Hassan, A. E., & Holt, R. C. (2004). The Small World of Software Reverse Engineering. 11th Working Conference on Reverse Engineering, 278–283. https://doi.org/10.1109/WCRE.2004.37
Tonella, P., Torchiano, M., Du Bois, B., & Systä, T. (2007). Empirical Studies in Reverse Engineering: State of the Art and Future Trends. Empirical Software Engineering, 12(5), 551–571. https://doi.org/10.1007/s10664-007-9037-5
Lungu, M. F. (2009). Reverse Engineering Software Ecosystems.
Treude, C., Filho, F. F., Storey, M.-A., & Salois, M. (2011). An Exploratory Study of Software Reverse Engineering in a Security Context. 2011 18th Working Conference on Reverse Engineering, 184–188. https://doi.org/10.1109/WCRE.2011.30
Gehl, R. W. (2017). (Critical) Reverse Engineering and Genealogy. Le Foucauldien, 3(1).
Shahbaz, M. (2012). Reverse Engineering and Testing of Black-Box Software Components. LAP LAMBERT ACADEMIC PUBL.
Halas, J. (2018). Marxian “Abstraction” and Contemporary Philosophy of Science. Epistemology & Philosophy of Science, 55(3), 122–136. https://journal.iph.ras.ru/article/view/2064
Porter, T. M. (2009). How Science Became Technical. Isis, 100(2), 292–309. https://doi.org/10.1086/599552
Hall, P. A. (Ed.). (1992). Software Reuse and Reverse Engineering in Practice (1. ed). Chapman & Hall.
Ziewitz, M. (2013). What Does Transparency Conceal?
Henrard, J., Englebert, V., Hick, J.-M., Roland, D., & Hainaut, J.-L. (1998). Program Understanding in Databases Reverse Engineering. In G. Quirchmayr, E. Schweighofer, & T. J. M. Bench-Capon (Eds.), Database and Expert Systems Applications (pp. 70–79). Springer. https://doi.org/10.1007/BFb0054469
Müller, H. A., Jahnke, J. H., Smith, D. B., Storey, M.-A., Tilley, S. R., & Wong, K. (2000). Reverse Engineering: A Roadmap. Proceedings of the Conference on The Future of Software Engineering, 47–60. https://doi.org/10.1145/336512.336526
Quadir, S. E., Chen, J., Forte, D., Asadizanjani, N., Shahbazmohamadi, S., Wang, L., Chandy, J., & Tehranipoor, M. (2016). A Survey on Chip to System Reverse Engineering. ACM Journal on Emerging Technologies in Computing Systems, 13(1), 6:1-6:34. https://doi.org/10.1145/2755563
K.N.·奥托 (美), & Otto, K. N. (2003). Product Design: Techniques in Reverse Engineering and New Product Development. 清华大学出版社有限公司.
Torrance, R., & James, D. (2009). The State-of-the-Art in IC Reverse Engineering. In C. Clavier & K. Gaj (Eds.), Cryptographic Hardware and Embedded Systems - CHES 2009 (pp. 363–381). Springer. https://doi.org/10.1007/978-3-642-04138-9_26
Diakopoulos, N. (2013, October 3). Rage Against the Algorithms. The Atlantic. https://www.theatlantic.com/technology/archive/2013/10/rage-against-the-algorithms/280255/
Keller, R. K., Schauer, R., Robitaille, S., & Pagé, P. (1999). Pattern-Based Reverse-Engineering of Design Components. Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No. 99CB37002), 226–235.
Kahveci, A., & Okutmuş, E. (2015). Examining the Effects of the Manufacturing Costs Using Teardown Analysis to Minimize the Costs. Paper Presented at the Inter-National Conference Challenges in Business and Economics: Growth, Competitive-Ness, Innovation, University of Niš, October 16.
Tegner, J., Yeung, M. K. S., Hasty, J., & Collins, J. J. (2003). Reverse Engineering Gene Networks: Integrating Genetic Perturbations with Dynamical Modeling. Proceedings of the National Academy of Sciences, 100(10), 5944–5949. https://doi.org/10.1073/pnas.0933416100
Torrance, R., & James, D. (2007). Reverse Engineering in the Semiconductor Industry. 2007 IEEE Custom Integrated Circuits Conference, 429–436. https://doi.org/10.1109/CICC.2007.4405767
Schulman, A., Maxey, D., & Pietrek, M. (1992). Undocumented Windows. Addison-Wesley.
Schulman, A. (Ed.). (1994). Undocumented DOS: a programmer’s guide to reserved MS-DOS functions and data structures (2nd ed). Addison-Wesley Pub. Co.