advanced capabilities while providing a variety of security services in general. One of the methods of protecting the code of a software product is the obfuscation process [3], which provides the services of information security and privacy. Thus, obfuscation is an important component of providing practical security services. The software obfuscation process consists of subprocesses that may or may not be used depending on the business process, total runtime, and level of protection provided. Creating models for each particular case is a costly process that requires unification. In this regard, the urgent task is to develop an approach based on the unification of the mathematical formalization of the software protection process to assess the probabilistic