Return to Article Details A Survey on Software Protection Techniques against Various Attacks Download Download PDF