Various kinds of software obfuscation methods have been proposed to protect security-sensitive information involved in software implementations. This paper proposes a cracker-centric approach to give a guideline for employing existing obfuscation methods to disrupt crackers' actions. KEY WORDS Software Protection, Attacks, Tamper-resistance, Symmetric-key Cryptography, Information Leakage