Introduction - If you have any usage issues, please Google them yourself
The obfuscation of existing theories, algorithms, and evaluation of attack patterns were reviewed prospected the future development of software obfuscation techniques and research directions.