Fig. 6From: Layered obfuscation: a taxonomy of software obfuscation techniques for layered securityControl-flow flattening approach proposed by Wang et al. (2000)Back to article page