{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:18:21Z","timestamp":1726035501085},"publisher-location":"Cham","reference-count":51,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030226596"},{"type":"electronic","value":"9783030226602"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22660-2_12","type":"book-chapter","created":{"date-parts":[[2019,7,7]],"date-time":"2019-07-07T23:02:38Z","timestamp":1562540558000},"page":"174-193","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Creating a User-Centric Data Flow Visualization: A Case Study"],"prefix":"10.1007","author":[{"given":"Karin","family":"Butler","sequence":"first","affiliation":[]},{"given":"Michelle","family":"Leger","sequence":"additional","affiliation":[]},{"given":"Denis","family":"Bueno","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Cuellar","sequence":"additional","affiliation":[]},{"given":"Michael J.","family":"Haass","sequence":"additional","affiliation":[]},{"given":"Timothy","family":"Loffredo","sequence":"additional","affiliation":[]},{"given":"Geoffrey","family":"Reedy","sequence":"additional","affiliation":[]},{"given":"Julian","family":"Tuminaro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,28]]},"reference":[{"key":"12_CR1","unstructured":"Somers, J.: The coming software apocalypse. The Atlantic, September 2017"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"D\u2019Silva, V., Payer, M., Song, D.: The correctness-security gap in compiler optimization. In: 2015 IEEE Security and Privacy Workshops, pp. 73\u201387, May 2015","DOI":"10.1109\/SPW.2015.33"},{"issue":"6","key":"12_CR3","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MSP.2015.132","volume":"13","author":"J Song","year":"2015","unstructured":"Song, J., Alves-Foss, J.: The DARPA cyber grand challenge: a competitor\u2019s perspective. IEEE Secur. Priv. 13(6), 72\u201376 (2015)","journal-title":"IEEE Secur. Priv."},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Shoshitaishvili, Y., et al.: Rise of the HaCRS: augmenting autonomous cyber reasoning systems with human assistance. CoRR abs\/1708.02749 (2017)","DOI":"10.1145\/3133956.3134105"},{"issue":"3","key":"12_CR5","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/S0164-1212(98)10055-9","volume":"44","author":"MAD Storey","year":"1999","unstructured":"Storey, M.A.D., Fracchia, F.D., M\u00fcller, H.A.: Cognitive design elements to support the construction of a mental model during software exploration. J. Syst. Softw. 44(3), 171\u2013185 (1999)","journal-title":"J. Syst. Softw."},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1016\/0005-1098(83)90046-8","volume":"19","author":"L Bainbridge","year":"1983","unstructured":"Bainbridge, L.: Ironies of automation. Automatica 19, 775\u2013779 (1983)","journal-title":"Automatica"},{"key":"12_CR7","unstructured":"Hu, H., Chua, Z.L., Adrian, S., Saxena, P., Liang, Z.: Automatic generation of data-oriented exploits. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 177\u2013192 USENIX Association, Washington (2015)"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Kildall, G.A.: A unified approach to global program optimization. In: Proceedings of the 1st Annual ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages. POPL 1973, pp. 194\u2013206. ACM, New York (1973)","DOI":"10.1145\/512927.512945"},{"key":"12_CR9","unstructured":"Hex-Rays, S.: IDA pro disassembler (2008). https:\/\/www.hex-rays.com\/products\/ida\/"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Quist, D.A., Liebrock, L.M.: Visualizing compiled executables for malware analysis. In: 2009 6th International Workshop on Visualization for Cyber Security, pp. 27\u201332, October 2009","DOI":"10.1109\/VIZSEC.2009.5375539"},{"key":"12_CR11","unstructured":"Zynamics: Zynamics BinNavi product description page. https:\/\/www.zynamics.com\/binnavi.html"},{"key":"12_CR12","first-page":"1","volume":"32","author":"J Rech","year":"2007","unstructured":"Rech, J., Sch\u00e4fer, W.: Visual support of software engineers during development and maintenance. ACM SIGSOFT Softw. Eng. Notes 32, 1\u20133 (2007)","journal-title":"ACM SIGSOFT Softw. Eng. Notes"},{"key":"12_CR13","unstructured":"Hardisty, Z.: Radia github page. https:\/\/github.com\/zoebear\/Radia"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Reddy, N.H., Kim, J., Palepu, V.K., Jones, J.A.: Spider sense: software-engineering, networked, system evaluation. In: 2015 IEEE 3rd Working Conference on Software Visualization (VISSOFT), pp. 205\u2013209. IEEE (2015)","DOI":"10.1109\/VISSOFT.2015.7332438"},{"key":"12_CR15","unstructured":"Ball, T., Eick, S.G.: Visualizing program slices. In: IEEE Symposium on Visual Languages, 1994. Proceedings, pp. 288\u2013295. IEEE (1994)"},{"issue":"11","key":"12_CR16","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1109\/32.177365","volume":"18","author":"S Eick","year":"1992","unstructured":"Eick, S., Steffen, J.L., Sumner, E.E.: Seesoft-a tool for visualizing line oriented software statistics. IEEE Trans. Softw. Eng. 18(11), 957\u2013968 (1992)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"12_CR17","unstructured":"M\u00fcller, H.A., Klashinsky, K.: Rigi-a system for programming-in-the-large. In: Proceedings of the 10th International Conference on Software Engineering. ICSE 1988, pp. 80\u201386. IEEE Computer Society Press, Los Alamitos (1988)"},{"key":"12_CR18","unstructured":"Storey, M.D., Muller, H.A.: Manipulating and documenting software structures using shrimp views. In: Proceedings of International Conference on Software Maintenance, pp. 275\u2013284, October 1995"},{"key":"12_CR19","unstructured":"Livadas, P.E., Alden, S.D.: A toolset for program understanding. In: [1993] IEEE Second Workshop on Program Comprehension, pp. 110\u2013118, July 1993"},{"key":"12_CR20","unstructured":"Brade, K., Guzdial, M., Steckel, M., Soloway, E.: Whorf: a visualization tool for software maintenance. In: Proceedings IEEE Workshop on Visual Languages, pp. 148\u2013154, September 1992"},{"key":"12_CR21","unstructured":"Baker, M.J., Eick, S.G.: Visualizing software systems. In: Proceedings of the 16th International Conference on Software Engineering. ICSE 1994, pp. 59\u201367. IEEE Computer Society Press, Los Alamitos (1994)"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Orso, A., Jones, J.A., Harrold, M.J., Stasko, J.: GAMMATELLA: visualization of program-execution data for deployed software. In: Proceedings 26th International Conference on Software Engineering, pp. 699\u2013700, May 2004","DOI":"10.1145\/774833.774843"},{"key":"12_CR23","unstructured":"Rajlich, V., Doran, J., Gudla, R.T.S.: Layered explanations of software: a methodology for program comprehension. In: Proceedings 1994 IEEE 3rd Workshop on Program Comprehension- WPC 1994, pp. 46\u201352, November 1994"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"LaToza, T.D., Myers, B.A.: Visualizing call graphs. In: 2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC), pp. 117\u2013124. IEEE (2011)","DOI":"10.1109\/VLHCC.2011.6070388"},{"key":"12_CR25","unstructured":"\u00c0lvarez, S.: The radare2 book (2009). https:\/\/radare.gitbooks.io\/radare2book\/content\/"},{"key":"12_CR26","unstructured":"Vector35: Vector 35 binary ninja product description page. https:\/\/binary.ninja"},{"key":"12_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-540-78791-4_13","volume-title":"Compiler Construction","author":"T W\u00fcrthinger","year":"2008","unstructured":"W\u00fcrthinger, T., Wimmer, C., M\u00f6ssenb\u00f6ck, H.: Visualization of program dependence graphs. In: Hendren, L. (ed.) CC 2008. LNCS, vol. 4959, pp. 193\u2013196. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-78791-4_13"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Deng, F., DiGiuseppe, N., Jones, J.A.: Constellation visualization: augmenting program dependence with dynamic information. In: 2011 6th International Workshop on Visualizing Software for Understanding and Analysis (VISSOFT), pp. 1\u20138, September 2011","DOI":"10.1109\/VISSOF.2011.6069453"},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Sui, Y., Xue, J.: SVF: Interprocedural static value-flow analysis in LLVM. In: Proceedings of the 25th International Conference on Compiler Construction. CC 2016, pp. 265\u2013266. ACM, New York (2016)","DOI":"10.1145\/2892208.2892235"},{"key":"12_CR30","doi-asserted-by":"crossref","unstructured":"Hoffswell, J., Satyanarayan, A., Heer, J.: Augmenting code with in situ visualizations to aid program understanding. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, p. 532. ACM (2018)","DOI":"10.1145\/3173574.3174106"},{"key":"12_CR31","doi-asserted-by":"crossref","unstructured":"Yakdan, K., Eschweiler, S., Gerhards-Padilla, E., Smith, M.: No more gotos: decompilation using pattern-independent control-flow structuring and semantic-preserving transformations. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23185"},{"key":"12_CR32","doi-asserted-by":"crossref","unstructured":"Yakdan, K., Dechand, S., Gerhards-Padilla, E., Smith, M.: Helping Johnny to analyze malware: a usability-optimized decompiler and malware analysis user study. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 158\u2013177, May 2016","DOI":"10.1109\/SP.2016.18"},{"issue":"6","key":"12_CR33","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1145\/301687.289568","volume":"XVIII","author":"TD Hendrix","year":"1998","unstructured":"Hendrix, T.D., Cross II, J.H., Barowski, L.A., Mathias, K.S.: Visual support for incremental abstraction and refinement in Ada 95. Ada Lett. XVIII(6), 142\u2013147 (1998)","journal-title":"Ada Lett."},{"key":"12_CR34","unstructured":"Victor, B.: Learnable programming (2012). http:\/\/worrydream.com"},{"key":"12_CR35","unstructured":"Victor, B.: The ladder of abstraction (2011). http:\/\/worrydream.com"},{"key":"12_CR36","unstructured":"Victor, B.: A brief rant on the future of interaction design (2011). http:\/\/worrydream.com"},{"key":"12_CR37","unstructured":"Fraze, D.: Computers and humans exploring software security (CHESS) (2018). https:\/\/www.darpa.mil\/program\/computers-and-humans-exploring-software-security"},{"key":"12_CR38","doi-asserted-by":"crossref","unstructured":"Mangal, R., Zhang, X., Nori, A.V., Naik, M.: A user-guided approach to program analysis. In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering. ESEC\/FSE 2015, pp. 462\u2013473. ACM, New York (2015)","DOI":"10.1145\/2786805.2786851"},{"key":"12_CR39","unstructured":"Sherwin, K.: Card sorting: uncover users\u2019 mental models for better information architecture. https:\/\/www.nngroup.com\/articles\/card-sorting-definition\/"},{"key":"12_CR40","doi-asserted-by":"crossref","unstructured":"Manadhata, P.K., Tan, K.M.C., Maxion, R.A., Wing, J.M.: An approach to measuring a system\u2019s attack surface. School of Computer Science Technical report CMU-CS-08-146, Carnegie Mellon University, Pittsburgh, PA, August 2007","DOI":"10.21236\/ADA476977"},{"issue":"12","key":"12_CR41","doi-asserted-by":"publisher","first-page":"1618","DOI":"10.1080\/001401398186108","volume":"41","author":"L Militello","year":"1998","unstructured":"Militello, L., Hutton, R.: Applied cognitive task analysis (ACTA): a practitioner\u2019s toolkit for understanding cognitive task demands. Ergonomics 41(12), 1618\u20131641 (1998)","journal-title":"Ergonomics"},{"key":"12_CR42","unstructured":"Darwin, I.: Original source packages for file utility (2012). ftp:\/\/ftp.astron.com\/pub\/file\/"},{"key":"12_CR43","unstructured":"Darwin, I.: Maintained source for file utility. https:\/\/github.com\/file\/file"},{"key":"12_CR44","unstructured":"Zalewski, M.: American fuzzy lop: a security-oriented fuzzer (2010). http:\/\/lcamtuf.coredump.cx\/afl\/. Accessed 21 June 2017"},{"key":"12_CR45","unstructured":"Fraze, D.: Cyber grand challenge (CGC) (2016). https:\/\/www.darpa.mil\/program\/cyber-grand-challeng"},{"key":"12_CR46","unstructured":"DARPA: DARPA CGC challenges source repository (2016). https:\/\/github.com\/CyberGrandChallenge\/samples\/tree\/master\/cqe-challenges"},{"key":"12_CR47","unstructured":"TrailOfBits: DARPA CGC challenges ported to standard OS (2016). https:\/\/github.com\/trailofbits\/cb-multios"},{"issue":"01","key":"12_CR48","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1518\/0018720024494829","volume":"44","author":"KJ Vicente","year":"2002","unstructured":"Vicente, K.J.: Ecological interface design: progress and challenges. Hum. Factors 44(01), 62\u201378 (2002)","journal-title":"Hum. Factors"},{"key":"12_CR49","doi-asserted-by":"crossref","unstructured":"Leger, M., et al.: Creating an interprocedural analyst-oriented data flow representation for binary analysts (CIAO). Technical report SAND2018-14238, Sandia National Laboratories, Albuquerque, NM, December 2018","DOI":"10.2172\/1529591"},{"issue":"1","key":"12_CR50","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1109\/TVCG.2017.2745279","volume":"24","author":"J Zhao","year":"2018","unstructured":"Zhao, J., Glueck, M., Isenberg, P., Chevalier, F., Khan, A.: Supporting handoff in asynchronous collaborative sensemaking using knowledge-transfer graphs. IEEE Trans. Vis. Comput. Graph. 24(1), 340\u2013350 (2018)","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"key":"12_CR51","unstructured":"NIST: Cve 2012\u20131571 (2012). https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2012-1571"}],"container-title":["Lecture Notes in Computer Science","Human Interface and the Management of Information. Visual Information and Knowledge Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22660-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T00:36:37Z","timestamp":1689726997000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-22660-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030226596","9783030226602"],"references-count":51,"URL":"http:\/\/dx.doi.org\/10.1007\/978-3-030-22660-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"28 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando, FL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2019.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}