Which of the following types of obfuscation transformation increases the difficulty for a de-obfuscation tool so that it cannot extract the true application from the obfuscated version?
A. Preventive transformation
B. Data obfuscation
C. Control obfuscation
D. Layout obfuscation
A. Preventive transformation
B. Data obfuscation
C. Control obfuscation
D. Layout obfuscation