This paper was written to give a better understanding of the various approaches taken in reverse engineering. It also provides insight into proper software design to protect sensitive data, etc.
You can download it from the following link: https://packetstormsecurity.com/files/download/67709/Reverse.Engineering.AntiCracking.Techniques.pdf
Source: https://packetstormsecurity.com/files/67709/Reverse.Engineering.AntiCracking.Techniques.pdf.html

