Return to Article Details Applied reverse engineering in context Download Download PDF