Fig. 3From: Layered obfuscation: a taxonomy of software obfuscation techniques for layered securityThe taxonomy of software obfuscation techniques for layered securityBack to article page