{"id":"https://openalex.org/W7133692299","doi":"https://doi.org/10.48550/arxiv.2603.03875","title":"Empirical Studies on Adversarial Reverse Engineering with Students","display_name":"Empirical Studies on Adversarial Reverse Engineering with Students","publication_year":2026,"publication_date":"2026-03-04","ids":{"openalex":"https://openalex.org/W7133692299","doi":"https://doi.org/10.48550/arxiv.2603.03875"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2603.03875","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5128202714","display_name":"Tab","orcid":null},"institutions":[{"id":"https://openalex.org/I4210116636","display_name":"Tiande (China)","ror":"https://ror.org/02das4m93","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210116636"]},{"id":"https://openalex.org/I4210133666","display_name":"Tiandi Science & Technology (China)","ror":"https://ror.org/03ssr6t63","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210133666"]},{"id":"https://openalex.org/I4210166364","display_name":"Tianyi Institute of Biological Technology","ror":"https://ror.org/05x0baj11","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210166364"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tab","raw_affiliation_strings":["Tianyi"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Tianyi","institution_ids":["https://openalex.org/I4210116636","https://openalex.org/I4210133666","https://openalex.org/I4210166364"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128130354","display_name":"Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090947977","display_name":"Bjorn De Sutter","orcid":"https://orcid.org/0000-0003-0317-2089"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"De Sutter, Bjorn","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053588590","display_name":"Christian Collberg","orcid":"https://orcid.org/0000-0003-1301-7939"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Collberg, Christian","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015140984","display_name":"Bart Coppens","orcid":"https://orcid.org/0000-0002-7628-9264"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Coppens, Bart","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5099082780","display_name":"Waleed Mebane","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mebane, Waleed","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5128202714"],"corresponding_institution_ids":["https://openalex.org/I4210116636","https://openalex.org/I4210133666","https://openalex.org/I4210166364"],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.4090999960899353,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.4090999960899353,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.10819999873638153,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.09759999811649323,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.8808000087738037},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.6601999998092651},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.5916000008583069},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5504999756813049},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.46970000863075256},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4221999943256378},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.40389999747276306}],"concepts":[{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.8808000087738037},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.6601999998092651},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.5916000008583069},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5504999756813049},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.49709999561309814},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.46970000863075256},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4221999943256378},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4072999954223633},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.40389999747276306},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.37929999828338623},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.37529999017715454},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.35910001397132874},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.3555000126361847},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.3395000100135803},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.33649998903274536},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3221000134944916},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3199000060558319},{"id":"https://openalex.org/C182500959","wikidata":"https://www.wikidata.org/wiki/Q7551380","display_name":"Social software engineering","level":5,"score":0.2851000130176544},{"id":"https://openalex.org/C46110900","wikidata":"https://www.wikidata.org/wiki/Q11702993","display_name":"Software walkthrough","level":5,"score":0.28060001134872437},{"id":"https://openalex.org/C171981572","wikidata":"https://www.wikidata.org/wiki/Q7554239","display_name":"Software analytics","level":5,"score":0.27390000224113464},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.27379998564720154},{"id":"https://openalex.org/C55587333","wikidata":"https://www.wikidata.org/wiki/Q1133029","display_name":"Engineering ethics","level":1,"score":0.2728999853134155},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.2711000144481659},{"id":"https://openalex.org/C2780103759","wikidata":"https://www.wikidata.org/wiki/Q5264375","display_name":"Design science","level":2,"score":0.2685999870300293},{"id":"https://openalex.org/C44416564","wikidata":"https://www.wikidata.org/wiki/Q7554199","display_name":"Software Engineering Process Group","level":5,"score":0.26179999113082886}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2603.03875","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2603.03875","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.03875","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2603.03875","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[{"score":0.4332563877105713,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Empirical":[0],"research":[1,77],"in":[2,51,136,161],"reverse":[3,31,53,102,123],"engineering":[4,54,103,119,124],"and":[5,23,40,59,73,78,87,90,105,144,147],"software":[6,19,118,142],"protection":[7,145],"is":[8],"crucial":[9],"for":[10,69,169],"evaluating":[11],"the":[12,45,60,63,71,76,114,137,167],"efficacy":[13],"of":[14,47,65,75,100,110,117,129,139],"methods":[15],"designed":[16],"to":[17,38,82,122,156],"protect":[18],"against":[20],"unauthorized":[21],"access":[22,37],"tampering.":[24],"However,":[25],"conducting":[26],"such":[27],"studies":[28,160],"with":[29,166],"professional":[30],"engineers":[32],"presents":[33],"significant":[34],"challenges,":[35],"including":[36],"professionals":[39],"affordability.":[41],"This":[42],"paper":[43],"explores":[44],"use":[46],"students":[48],"as":[49],"participants":[50],"empirical":[52,159],"experiments,":[55,125],"examining":[56],"their":[57],"suitability":[58],"necessary":[61],"training;":[62],"design":[64],"appropriate":[66],"challenges;":[67],"strategies":[68],"ensuring":[70],"rigor":[72],"validity":[74],"its":[79],"results;":[80],"ways":[81],"maintain":[83],"students'":[84],"privacy,":[85],"motivation,":[86],"voluntary":[88],"participation;":[89],"data":[91],"collection":[92],"methods.":[93],"We":[94],"present":[95],"a":[96,108,140],"systematic":[97],"literature":[98],"review":[99],"existing":[101],"experiments":[104,134],"user":[106],"studies,":[107],"discussion":[109,128],"related":[111],"work":[112],"from":[113],"broader":[115],"domain":[116],"that":[120],"applies":[121],"an":[126],"extensive":[127],"our":[130],"own":[131],"experience":[132],"running":[133],"ourselves":[135],"context":[138],"master-level":[141],"hacking":[143],"course,":[146],"recommendations":[148],"based":[149],"on":[150],"this":[151],"experience.":[152],"Our":[153],"findings":[154],"aim":[155],"guide":[157],"future":[158],"RE,":[162],"balancing":[163],"practical":[164],"constraints":[165],"need":[168],"meaningful,":[170],"reproducible":[171],"results.":[172]},"counts_by_year":[],"updated_date":"2026-05-04T08:30:34.212998","created_date":"2026-03-06T00:00:00"}
