Assessing the Security Properties of Software Obfuscation