Two articles that present an introduction to reverse engineering a disassembly dump from gdb into an accurate C program. Armed with this knowledge, it will allow a researcher to depict potentially vulnerable functions and gather further information as to the inner workings of the program.
bf1e8cddd02f2b9a3596e09d9b6339416a963224a6f82253a05b301170ac8ff9