Fig. 2From: Layered obfuscation: a taxonomy of software obfuscation techniques for layered securityMotivating examples for layered obfuscationBack to article page