How Professional Hackers Understand Protected Code while Performing Attack Tasks