Behera, Chandan Kumar; Bhaskari, D. Lalitha - In: International Journal of Secure Software Engineering (IJSSE) 8 (2017) 3, pp. 24-41
This article describes how code obfuscation techniques aim to conceal the functionality of a program by mystifying the … being analyzed by hiding their behaviors or compressing their semantics by using obfuscation techniques. On the contrary … is binary obfuscation. …