Detection of Reverse Engineering Activities Before the Attack | IEEE Conference Publication | IEEE Xplore