Identifying the applied obfuscation method towards de-obfuscation | IEEE Conference Publication | IEEE Xplore