A Taxonomy of Obfuscating Transformations

Christian Collberg,Clark Thomborson,Douglas Low
1997-01-01
Abstract: It has become more and more common to distribute software in forms that retain most or all of the information present in the original source code. An important example is Java bytecode. Since such codes are easy to decompile, they increase the risk of malicious reverse engineering attacks. In this paper we review several techniques for technical protection of software secrets. We will argue that automatic code obfuscation is currently the most viable method for preventing reverse engineering....
What problem does this paper attempt to address?