Table of contents
1. Understand the threats of reverse engineering
1.1 Risks of reverse engineering
1.2 Possible attack types
2. Common reverse engineering protection methods