{"id":"https://openalex.org/W7133335222","doi":"https://doi.org/10.1109/tps-isa67132.2025.00032","title":"Decoding the Decoders: An Empirical Study of Reverse Engineering Questions on Stack Exchange","display_name":"Decoding the Decoders: An Empirical Study of Reverse Engineering Questions on Stack Exchange","publication_year":2025,"publication_date":"2025-11-12","ids":{"openalex":"https://openalex.org/W7133335222","doi":"https://doi.org/10.1109/tps-isa67132.2025.00032"},"language":null,"primary_location":{"id":"doi:10.1109/tps-isa67132.2025.00032","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tps-isa67132.2025.00032","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 7th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101486322","display_name":"Md Rakibul Islam","orcid":"https://orcid.org/0009-0009-9104-874X"},"institutions":[{"id":"https://openalex.org/I177898655","display_name":"Lamar University","ror":"https://ror.org/008ms5s18","country_code":"US","type":"education","lineage":["https://openalex.org/I177898655"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Md Rakibul Islam","raw_affiliation_strings":["Lamar University,Department of Computer Science,Beaumont,TX,USA"],"affiliations":[{"raw_affiliation_string":"Lamar University,Department of Computer Science,Beaumont,TX,USA","institution_ids":["https://openalex.org/I177898655"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040776991","display_name":"Md. Humaun Kabir","orcid":null},"institutions":[{"id":"https://openalex.org/I177898655","display_name":"Lamar University","ror":"https://ror.org/008ms5s18","country_code":"US","type":"education","lineage":["https://openalex.org/I177898655"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Md Humaun Kabir","raw_affiliation_strings":["Lamar University,Department of Electrical and Computer Engineering,Beaumont,TX,USA"],"affiliations":[{"raw_affiliation_string":"Lamar University,Department of Electrical and Computer Engineering,Beaumont,TX,USA","institution_ids":["https://openalex.org/I177898655"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037665090","display_name":"Anwarul Islam Sifat","orcid":"https://orcid.org/0000-0003-4587-8848"},"institutions":[{"id":"https://openalex.org/I177898655","display_name":"Lamar University","ror":"https://ror.org/008ms5s18","country_code":"US","type":"education","lineage":["https://openalex.org/I177898655"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anwarul Islam Sifat","raw_affiliation_strings":["Lamar University,Department of Electrical and Computer Engineering,Beaumont,TX,USA"],"affiliations":[{"raw_affiliation_string":"Lamar University,Department of Electrical and Computer Engineering,Beaumont,TX,USA","institution_ids":["https://openalex.org/I177898655"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101486322"],"corresponding_institution_ids":["https://openalex.org/I177898655"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.88677586,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"226","last_page":"236"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12380","display_name":"Authorship Attribution and Profiling","score":0.23999999463558197,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12380","display_name":"Authorship Attribution and Profiling","score":0.23999999463558197,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12268","display_name":"Deception detection and forensic psychology","score":0.0828000009059906,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13274","display_name":"Expert finding and Q&A systems","score":0.0778999999165535,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.6729999780654907},{"id":"https://openalex.org/keywords/latent-dirichlet-allocation","display_name":"Latent Dirichlet allocation","score":0.6392999887466431},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.5927000045776367},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4408999979496002},{"id":"https://openalex.org/keywords/topic-model","display_name":"Topic model","score":0.4366999864578247},{"id":"https://openalex.org/keywords/thematic-analysis","display_name":"Thematic analysis","score":0.3490000069141388},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.3352000117301941},{"id":"https://openalex.org/keywords/question-answering","display_name":"Question answering","score":0.3262999951839447}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.746399998664856},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.6729999780654907},{"id":"https://openalex.org/C500882744","wikidata":"https://www.wikidata.org/wiki/Q269236","display_name":"Latent Dirichlet allocation","level":3,"score":0.6392999887466431},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.5927000045776367},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.46799999475479126},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4408999979496002},{"id":"https://openalex.org/C171686336","wikidata":"https://www.wikidata.org/wiki/Q3532085","display_name":"Topic model","level":2,"score":0.4366999864578247},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.37470000982284546},{"id":"https://openalex.org/C74196892","wikidata":"https://www.wikidata.org/wiki/Q7781188","display_name":"Thematic analysis","level":3,"score":0.3490000069141388},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.3352000117301941},{"id":"https://openalex.org/C44291984","wikidata":"https://www.wikidata.org/wiki/Q1074173","display_name":"Question answering","level":2,"score":0.3262999951839447},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.32269999384880066},{"id":"https://openalex.org/C158154518","wikidata":"https://www.wikidata.org/wiki/Q7310970","display_name":"Relevance (law)","level":2,"score":0.3027999997138977},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.29739999771118164},{"id":"https://openalex.org/C9395851","wikidata":"https://www.wikidata.org/wiki/Q177929","display_name":"Stack (abstract data type)","level":2,"score":0.2962000072002411},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.296099990606308},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.28459998965263367},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.2775999903678894},{"id":"https://openalex.org/C166052673","wikidata":"https://www.wikidata.org/wiki/Q83021","display_name":"Empirical evidence","level":2,"score":0.2734000086784363},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.26510000228881836},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.26429998874664307},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.2615000009536743},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.2590000033378601},{"id":"https://openalex.org/C101317890","wikidata":"https://www.wikidata.org/wiki/Q940053","display_name":"Software maintenance","level":4,"score":0.2540000081062317},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.25290000438690186}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tps-isa67132.2025.00032","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tps-isa67132.2025.00032","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 7th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1659842140","https://openalex.org/W2038043464","https://openalex.org/W2093400716","https://openalex.org/W2123246351","https://openalex.org/W2168970028","https://openalex.org/W2511548333","https://openalex.org/W2759023773","https://openalex.org/W2895297154","https://openalex.org/W2925197115","https://openalex.org/W2962771808","https://openalex.org/W3024200301","https://openalex.org/W3032791547","https://openalex.org/W3045004532","https://openalex.org/W3091658513","https://openalex.org/W3096688843","https://openalex.org/W3159568147","https://openalex.org/W3191950921","https://openalex.org/W3198375663","https://openalex.org/W3208323417","https://openalex.org/W3213062391","https://openalex.org/W4205420848","https://openalex.org/W4286530339","https://openalex.org/W4288079617","https://openalex.org/W4294214983","https://openalex.org/W4310858786","https://openalex.org/W4328028482","https://openalex.org/W4380568707","https://openalex.org/W4390112232","https://openalex.org/W4399573710"],"related_works":[],"abstract_inverted_index":{"Reverse":[0,237],"engineering":[1,290],"(RE)":[2],"plays":[3],"a":[4,171,192,301],"vital":[5],"role":[6],"in":[7,34,86],"software":[8,289],"analysis,":[9],"security":[10],"auditing,":[11],"legacy":[12],"system":[13],"maintenance,":[14],"and":[15,30,37,45,66,82,111,133,163,186,255,270,282,294,316,326,332],"vulnerability":[16],"detection.":[17],"Despite":[18],"its":[19],"critical":[20],"importance,":[21],"there":[22],"is":[23],"limited":[24],"understanding":[25],"of":[26,108,195,229,304],"how":[27],"developers":[28,208],"seek":[29,96,219],"share":[31],"RErelated":[32,129],"knowledge":[33,83],"online":[35],"question":[36,196],"answering":[38],"(Q&A)":[39],"communities":[40],"such":[41,235],"as":[42,57,236,261],"the":[43,51,62,78,100,106,114,227,262],"RE":[44,70,87,120,132,156,207,275],"Stack":[46,52],"Overflow":[47],"(SO)":[48],"sites":[49,135],"on":[50,89,175,266],"Exchange":[53],"network,":[54],"which":[55],"serve":[56],"rich":[58],"resources":[59],"for":[60,312],"exploring":[61],"practical":[63,220],"challenges,":[64],"tools,":[65],"topics":[67,102,159,212],"that":[68,206],"engage":[69],"practitioners.":[71],"Thus,":[72],"we":[73,95,125,152,190],"aim":[74],"to":[75,97,198,287],"empirically":[76],"investigate":[77],"trends,":[79],"thematic":[80],"concerns,":[81],"gaps":[84],"present":[85],"discussions":[88,276],"developer":[90],"QA":[91],"forums.":[92],"In":[93],"particular,":[94],"(i)":[98],"identify":[99],"key":[101],"discussed,":[103,246],"(ii)":[104],"understand":[105],"nature":[107],"questions":[109,224],"asked,":[110],"(iii)":[112],"assess":[113,199],"difficulty":[115],"levels":[116],"associated":[117],"with":[118,147,222],"various":[119],"topics.":[121,157],"To":[122],"do":[123],"that,":[124],"collect":[126],"over":[127],"12,000":[128],"posts":[130,230],"from":[131,300],"SO":[134],"spanning":[136],"more":[137],"than":[138],"two":[139],"decades.":[140],"Using":[141],"Latent":[142],"Dirichlet":[143],"Allocation":[144],"(LDA)":[145],"enhanced":[146],"Genetic":[148],"Algorithm":[149],"(GA)":[150],"optimization,":[151],"extract":[153],"semantically":[154],"coherent":[155],"These":[158],"are":[160,243,259,334],"manually":[161],"labeled":[162],"clustered":[164],"into":[165,214],"high-level":[166],"categories.":[167,216,233],"We":[168],"then":[169],"conduct":[170],"multidimensional":[172],"analysis":[173],"based":[174,265],"topic":[176],"frequency,":[177],"average":[178,279],"post":[179,284],"scores,":[180],"view":[181,280],"counts,":[182],"answer":[183],"acceptance":[184],"rates,":[185],"response":[187,272],"times.":[188,273],"Additionally,":[189],"perform":[191],"qualitative":[193],"classification":[194],"types":[197],"community":[200,320],"information-seeking":[201],"behaviors.":[202],"Our":[203],"findings":[204],"reveal":[205],"predominantly":[209],"discuss":[210],"23":[211],"grouped":[213],"six":[215],"They":[217],"also":[218,298],"guidance,":[221],"\u201cHow\u201d-type":[223],"making":[225],"up":[226],"majority":[228],"across":[231],"all":[232],"Topics":[234],"Engineering":[238],"Challenges":[239],"(Games":[240],"&":[241,252],"Puzzles)":[242],"most":[244,263],"frequently":[245],"while":[247],"areas":[248,328],"like":[249,292],"File":[250],"Formats":[251],"System":[253],"Behavior":[254],"Memory-Level":[256],"Firmware":[257],"Analysis":[258],"identified":[260],"difficult,":[264],"high":[267],"unanswered":[268],"rates":[269],"delayed":[271],"Moreover,":[274],"exhibit":[277],"higher":[278],"counts":[281],"perceived":[283],"quality":[285],"compared":[286],"other":[288],"domains":[291],"chatbots":[293],"big":[295],"data,":[296],"but":[297],"suffer":[299],"greater":[302],"proportion":[303],"unresolved":[305],"queries.":[306],"The":[307],"results":[308],"offer":[309],"actionable":[310],"insights":[311],"tool":[313],"developers,":[314],"educators,":[315],"researchers":[317],"by":[318],"identifying":[319],"pain":[321],"points,":[322],"prioritizing":[323],"educational":[324],"needs,":[325],"highlighting":[327],"where":[329],"further":[330],"automation":[331],"support":[333],"required.":[335]},"counts_by_year":[],"updated_date":"2026-03-05T07:30:30.508283","created_date":"2026-03-04T00:00:00"}
