to obfuscation in natural language, code obfuscation may involve using unnecessarily roundabout ways to write statements. Programmers often obfuscate code...
18 KB (1,668 words) - 18:48, 29 May 2025
indistinguishability obfuscation (abbreviated IO or iO) is a type of software obfuscation with the defining property that obfuscating any two programs that...
23 KB (2,298 words) - 12:53, 10 October 2024
criteria at a specified time Software development process – Process by which software is developed Obfuscation (software) – Deliberate creation of...
6 KB (695 words) - 21:22, 5 December 2024
Security through obscurity (redirect from Security by obfuscation)
to know Obfuscation (software) Secure by design AACS encryption key controversy Full disclosure (computer security) Code talker Obfuscation Concealment...
14 KB (1,408 words) - 10:41, 8 April 2025
ProGuard (redirect from ProGuard (software))
open-source software portal Computer programming portal Java (programming language) Program optimization Obfuscation (software) Dotfuscator DashO (software) "Eric...
4 KB (252 words) - 05:59, 20 December 2024
cryptography, black-box obfuscation was a proposed cryptographic primitive which would allow a computer program to be obfuscated in a way such that it was...
7 KB (979 words) - 14:23, 8 March 2025
communication by making it difficult to understand. Obfuscation may also refer to: Obfuscation (software), creating code that is intentionally difficult for...
487 bytes (101 words) - 15:22, 26 April 2025
followed is a "good boy". Proprietary software developers are constantly developing techniques such as code obfuscation, encryption, and self-modifying code...
25 KB (2,765 words) - 15:12, 9 June 2025
Proprietary software is software that grants its creator, publisher, or other rightsholder or rightsholder partner a legal monopoly by modern copyright...
44 KB (4,905 words) - 01:48, 29 May 2025
Computing platform (redirect from Platform in Software)
or software platform is the infrastructure on which software is executed. While the individual components of a computing platform may be obfuscated under...
10 KB (972 words) - 09:23, 16 June 2025
The Obfuscated Perl Contest was a competition for programmers of Perl which was held annually between 1996 and 2000. Entrants to the competition aimed...
2 KB (253 words) - 02:41, 9 October 2024
server-side software is closed-source and proprietary. Pavel Durov said that it would require a major architectural redesign of the server-side software to connect...
215 KB (19,289 words) - 14:32, 15 June 2025
Brave (web browser) (redirect from Brave (software))
browser which was first released in 2016. It is developed by US-based Brave Software, Inc. and based on the Chromium web browser. The browser is marketed as...
30 KB (2,789 words) - 16:41, 16 June 2025
Malware (redirect from Malicious software)
investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the...
76 KB (7,664 words) - 19:23, 5 June 2025
Reverse engineering (redirect from Reverse engineering of software)
anti-tamper technology like obfuscation is used to deter both reverse engineering and re-engineering of proprietary software and software-powered systems. In...
57 KB (7,364 words) - 23:22, 2 June 2025
Undetectable.ai) is an artificial intelligence content detection and modification software designed to identify and alter artificially generated text, such as that...
10 KB (835 words) - 12:48, 26 May 2025
Software companies focusing on the development of open-source software (OSS) employ a variety of business models to solve the challenge of making profits...
72 KB (8,334 words) - 13:32, 24 May 2025
Code morphing (category Software obfuscation)
Code morphing is an approach used in obfuscating software to protect software applications from reverse engineering, analysis, modifications, and cracking...
3 KB (309 words) - 01:03, 5 November 2024
hardware obfuscation modifies the design in such a away that the resulting architecture becomes un-obvious to an adversary. Hardware Obfuscation can be...
8 KB (1,115 words) - 02:32, 26 December 2024
out zero bytes, equivalent to its source code. In the effort to take obfuscation to its extremes, contestants have produced programs which skirt around...
23 KB (2,874 words) - 07:37, 26 February 2025
Anti-tamper software is software which makes it harder for an attacker to modify it. The measures involved can be passive such as obfuscation to make reverse...
8 KB (890 words) - 23:10, 1 May 2025
Sam Spade is a discontinued Windows software tool designed to assist in tracking down sources of e-mail spam. The same name was also used for a related...
3 KB (312 words) - 08:32, 12 June 2025
Skype (redirect from Skype (software))
Erik; John, Wolfgang (27 July 2010). "Breaking and Improving Protocol Obfuscation" (PDF). Technical Report. ISSN 1652-926X. "Skype's new super wideband...
100 KB (9,263 words) - 06:02, 10 June 2025
Gray-box testing (category Software testing)
understand the requirements and verify its correctness. Object-oriented software consists primarily of objects; where objects are single indivisible units...
9 KB (1,036 words) - 22:35, 28 November 2024
EDonkey network (section Server software)
eD2k protocol extensions are "peer exchange among clients", "protocol obfuscation" and support for files larger than four gigabytes, etc. The other eD2k...
19 KB (2,262 words) - 11:52, 6 June 2025
debugging and logging calls. Dotfuscator — a code obfuscator for .NET. ProGuard (software) — a code obfuscator for Java. "DashO Pro - Java Application/Applet...
3 KB (220 words) - 15:26, 24 June 2024
general notions of obfuscation, in particular, to Black-box obfuscation, proven to be impossible, and to Indistinguishability obfuscation, constructed recently...
20 KB (2,480 words) - 08:03, 11 June 2025
Address munging (redirect from Email address obfuscation)
Content delivery network vendors, such as Cloudflare, offer email address obfuscation services to their clients. "Transparent name mangling" involves replacing...
10 KB (1,026 words) - 22:44, 19 February 2025
Internet censorship circumvention (redirect from List of software for internet censorship circumvention)
used to avoid censorship, especially when configured to use traffic obfuscation techniques. A censor may be able to detect and block use of circumvention...
46 KB (4,265 words) - 23:42, 4 June 2025
This list of Apache Software Foundation projects contains the software development projects of The Apache Software Foundation (ASF). Besides the projects...
38 KB (4,300 words) - 16:50, 29 May 2025