Flake, Halvar2006-08-172006-08-172004-07http://hdl.handle.net/2003/2279910.17877/DE290R-2023enReverse EngineeringVulnerability Assessment004Structural Comparison of Executable Objectsconference contribution