In this paper, we offer technical details of control-flow and data-flow obfuscation techniques based on the idea that no source code or other dependencies are required to apply strong obfuscation directly to the intermediate bitcode representation rather than the original source code or the native binaries. We conclude by providing insights into the usage of obfuscation in relation to the security requirements of connected and cloud software systems