This resource is no longer available
One of the most important weapons available to developers and security teams in the war against application piracy, device infiltration, code injection, and other malicious acts, is source code obfuscation.
In Zimperium's Top 7 Source Code Obfuscation Techniques report, they review how obfuscation in programming works and the top obfuscation security techniques used by mobile app developers around the world. Read on to learn more.