Fig. 8From: Layered obfuscation: a taxonomy of software obfuscation techniques for layered securityThe obfuscation techniques of inter-component layerBack to article page