Rethinking the Reverse-engineering of Trojan Triggers