This explains and compares various methods of obfuscation.

 

http://www.cs.arizona.edu/~collberg/Research/Publications/CollbergThomborsonLow97a/

 

-Mikhail.

Reply via email to