Identifying Malicious Code Through Reverse Engineering