[PDF][PDF] Intensification of Software Security using Secure Obfuscation with Injecting and Detecting Code Clones
This chapter presents background and related work on software security. We eventuate with
section 2.1, which provides a brief introduction about software security. In section 2.2 we …
section 2.1, which provides a brief introduction about software security. In section 2.2 we …