Tag secure keys during reverse engineering