1 code implementation • Future Generation Computer Systems 2019 • Omid Mirzaei, Jose Maria de Fuentes, Juan Tapiador, Lorena Gonzáles-Manzano
This is typically applied to protect intellectual property in benign apps, or to hinder the process of extracting actionable information in the case malware.