“…According to effectiveness and efficiency, obfuscating transformations are classified with four categories, including layout obfuscation, data obfuscation, control obfuscation, and preventive obfuscation. So far, the research on code obfuscation algorithms has been very mature, and various algorithms have emerged endlessly [12], [29], [54], [13], [41], [56]. Table I shows eight typical code obfuscation algorithms, most of the existing algorithms are derived from them.…”