Reverse Engineering of Adversaries: 

Foundations and Applications

Introduction