Obfuscation and methods of protection software

Main Article Content

Ксения Юрьевна Никольская
А. Д. Хлестов

Abstract

This article focuses on the technical review of the main methods of protection software. The process of obfuscation to date one of the most popular and commonly used methods of protection, so it is in a separate block for a more detailed study.

Article Details

Section
COMPUTER SECURITY