{"id":"https://openalex.org/W3176405869","doi":"https://doi.org/10.1007/978-3-030-79997-7_29","title":"Strategies of Naive Software Reverse Engineering: A Qualitative Analysis","display_name":"Strategies of Naive Software Reverse Engineering: A Qualitative Analysis","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3176405869","doi":"https://doi.org/10.1007/978-3-030-79997-7_29","mag":"3176405869"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-79997-7_29","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-79997-7_29","pdf_url":null,"source":{"id":"https://openalex.org/S4210169156","display_name":"Lecture notes in networks and systems","issn_l":"2367-3370","issn":["2367-3370","2367-3389"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319972","host_organization_name":"Springer International Publishing","host_organization_lineage":["https://openalex.org/P4310319972","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer International Publishing","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Networks and Systems","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011684435","display_name":"Salsabil Hamadache","orcid":"https://orcid.org/0000-0002-9283-4736"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Salsabil Hamadache","raw_affiliation_strings":["Horst-G\u00f6rtz Institute for IT Security, Ruhr University Bochum, Bochum, Germany","Psychology of Human Technology Interaction Group, Faculty of Psychology, Ruhr University Bochum, Universitaetsstrasse 150, 44801, Bochum, Germany","Psychology of Human Technology Interaction Group, Faculty of Psychology, Ruhr University Bochum, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Horst-G\u00f6rtz Institute for IT Security, Ruhr University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]},{"raw_affiliation_string":"Psychology of Human Technology Interaction Group, Faculty of Psychology, Ruhr University Bochum, Universitaetsstrasse 150, 44801, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]},{"raw_affiliation_string":"Psychology of Human Technology Interaction Group, Faculty of Psychology, Ruhr University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110564894","display_name":"Markus Krause","orcid":null},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Markus Krause","raw_affiliation_strings":["Horst-G\u00f6rtz Institute for IT Security, Ruhr University Bochum, Bochum, Germany","Psychology of Human Technology Interaction Group, Faculty of Psychology, Ruhr University Bochum, Universitaetsstrasse 150, 44801, Bochum, Germany","Psychology of Human Technology Interaction Group, Faculty of Psychology, Ruhr University Bochum, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Horst-G\u00f6rtz Institute for IT Security, Ruhr University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]},{"raw_affiliation_string":"Psychology of Human Technology Interaction Group, Faculty of Psychology, Ruhr University Bochum, Universitaetsstrasse 150, 44801, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]},{"raw_affiliation_string":"Psychology of Human Technology Interaction Group, Faculty of Psychology, Ruhr University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076659092","display_name":"Malte Elson","orcid":"https://orcid.org/0000-0001-7806-9583"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Malte Elson","raw_affiliation_strings":["Horst-G\u00f6rtz Institute for IT Security, Ruhr University Bochum, Bochum, Germany","Psychology of Human Technology Interaction Group, Faculty of Psychology, Ruhr University Bochum, Universitaetsstrasse 150, 44801, Bochum, Germany","Psychology of Human Technology Interaction Group, Faculty of Psychology, Ruhr University Bochum, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Horst-G\u00f6rtz Institute for IT Security, Ruhr University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]},{"raw_affiliation_string":"Psychology of Human Technology Interaction Group, Faculty of Psychology, Ruhr University Bochum, Universitaetsstrasse 150, 44801, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]},{"raw_affiliation_string":"Psychology of Human Technology Interaction Group, Faculty of Psychology, Ruhr University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5011684435"],"corresponding_institution_ids":["https://openalex.org/I904495901"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13854501,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"232","last_page":"237"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9757000207901001,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.8185914754867554},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7181042432785034},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.5786164999008179},{"id":"https://openalex.org/keywords/program-comprehension","display_name":"Program comprehension","score":0.5551804304122925},{"id":"https://openalex.org/keywords/code-review","display_name":"Code review","score":0.5309889912605286},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5036565661430359},{"id":"https://openalex.org/keywords/kpi-driven-code-analysis","display_name":"KPI-driven code analysis","score":0.4718962609767914},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4203079640865326},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.41551294922828674},{"id":"https://openalex.org/keywords/static-program-analysis","display_name":"Static program analysis","score":0.40936675667762756},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.40702447295188904},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.2895168364048004},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.2251918911933899}],"concepts":[{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.8185914754867554},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7181042432785034},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5786164999008179},{"id":"https://openalex.org/C2777561058","wikidata":"https://www.wikidata.org/wiki/Q2652119","display_name":"Program comprehension","level":4,"score":0.5551804304122925},{"id":"https://openalex.org/C150292731","wikidata":"https://www.wikidata.org/wiki/Q1342704","display_name":"Code review","level":5,"score":0.5309889912605286},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5036565661430359},{"id":"https://openalex.org/C121957198","wikidata":"https://www.wikidata.org/wiki/Q14365593","display_name":"KPI-driven code analysis","level":5,"score":0.4718962609767914},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4203079640865326},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.41551294922828674},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.40936675667762756},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.40702447295188904},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.2895168364048004},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.2251918911933899},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-030-79997-7_29","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-79997-7_29","pdf_url":null,"source":{"id":"https://openalex.org/S4210169156","display_name":"Lecture notes in networks and systems","issn_l":"2367-3370","issn":["2367-3370","2367-3389"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319972","host_organization_name":"Springer International Publishing","host_organization_lineage":["https://openalex.org/P4310319972","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer International Publishing","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Networks and Systems","raw_type":"book-chapter"},{"id":"pmh:oai:boris.unibe.ch:180591","is_oa":false,"landing_page_url":"https://boris.unibe.ch/180591/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401086","display_name":"Bern Open Repository and Information System (University of Bern)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I118564535","host_organization_name":"University of Bern","host_organization_lineage":["https://openalex.org/I118564535"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Hamadache, Salsabil; Krause, Markus; Elson, Malte (2021). Strategies of Naive Software Reverse Engineering: A Qualitative Analysis. In: Zallio, Matteo; Iba\u00f1ez, Carlos Raymundo; Hernandez, Jesus Hechavarria (eds.) International Conference on Applied Human Factors and Ergonomics. Lecture Notes in Networks and Systems: Vol. 268 (pp. 232-237). Cham: Springer 10.1007/978-3-030-79997-7_29 &lt;http://dx.doi.org/10.1007/978-3-030-79997-7_29&gt;","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.4099999964237213,"id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1967931023","https://openalex.org/W2050344266","https://openalex.org/W2170147406","https://openalex.org/W2559900996","https://openalex.org/W2586043455","https://openalex.org/W2734896486","https://openalex.org/W2754667819","https://openalex.org/W2889188934"],"related_works":["https://openalex.org/W2591877226","https://openalex.org/W3153702491","https://openalex.org/W2969257295","https://openalex.org/W3008981372","https://openalex.org/W2904997879","https://openalex.org/W2139694402","https://openalex.org/W2034209539","https://openalex.org/W2938801257","https://openalex.org/W2963381560","https://openalex.org/W3135060008"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
