Assessment of Source Code Obfuscation Techniques