@inproceedings{lin2010reverse-data,
address = {West Lafayette, IN},
articleno = {Article 5},
author = {Lin, Zhiqiang and Zhang, Xiangyu and Xu, Dongyan},
booktitle = {Proceedings of the 11th Annual Information Security Symposium},
date-added = {2020-11-15 23:36:57 -0800},
date-modified = {2020-11-15 23:36:57 -0800},
location = {West Lafayette, Indiana},
numpages = {1},
publisher = {CERIAS - Purdue University},
series = {CERIAS '10},
title = {Automatic Reverse Engineering of Data Structures from Binary Execution},
year = {2010},
bdsk-file-1 = {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}
}