Found in 1 comment on Hacker News
rdc12 · 2014-11-18 · Original thread
My immediate thought was about this interesting sounding book [1]

http://www.amazon.com/Surreptitious-Software-Obfuscation-Wat...