• to obfuscation in natural language, code obfuscation may involve using unnecessarily roundabout ways to write statements. Programmers often obfuscate code...
    18 KB (1,668 words) - 18:48, 29 May 2025
  • indistinguishability obfuscation (abbreviated IO or iO) is a type of software obfuscation with the defining property that obfuscating any two programs that...
    23 KB (2,298 words) - 12:53, 10 October 2024
  • criteria at a specified time Software development process – Process by which software is developed Obfuscation (software) – Deliberate creation of...
    6 KB (695 words) - 21:22, 5 December 2024
  • Thumbnail for Security through obscurity
    to know Obfuscation (software) Secure by design AACS encryption key controversy Full disclosure (computer security) Code talker Obfuscation Concealment...
    14 KB (1,408 words) - 10:41, 8 April 2025
  • Thumbnail for ProGuard
    ProGuard (redirect from ProGuard (software))
    open-source software portal Computer programming portal Java (programming language) Program optimization Obfuscation (software) Dotfuscator DashO (software) "Eric...
    4 KB (252 words) - 05:59, 20 December 2024
  • or software platform is the infrastructure on which software is executed. While the individual components of a computing platform may be obfuscated under...
    10 KB (972 words) - 16:50, 27 May 2025
  • cryptography, black-box obfuscation was a proposed cryptographic primitive which would allow a computer program to be obfuscated in a way such that it was...
    7 KB (979 words) - 14:23, 8 March 2025
  • Thumbnail for Telegram (software)
    server-side software is closed-source and proprietary. Pavel Durov said that it would require a major architectural redesign of the server-side software to connect...
    213 KB (19,154 words) - 10:37, 3 June 2025
  • Anti-tamper software is software which makes it harder for an attacker to modify it. The measures involved can be passive such as obfuscation to make reverse...
    8 KB (890 words) - 23:10, 1 May 2025
  • communication by making it difficult to understand. Obfuscation may also refer to: Obfuscation (software), creating code that is intentionally difficult for...
    487 bytes (101 words) - 15:22, 26 April 2025
  • Thumbnail for Proprietary software
    Proprietary software is software that grants its creator, publisher, or other rightsholder or rightsholder partner a legal monopoly by modern copyright...
    44 KB (4,905 words) - 01:48, 29 May 2025
  • Thumbnail for Software cracking
    followed is a "good boy". Proprietary software developers are constantly developing techniques such as code obfuscation, encryption, and self-modifying code...
    25 KB (2,765 words) - 03:14, 26 May 2025
  • Thumbnail for Undetectable.ai
    Undetectable.ai) is an artificial intelligence content detection and modification software designed to identify and alter artificially generated text, such as that...
    10 KB (835 words) - 12:48, 26 May 2025
  • Malware (redirect from Malicious software)
    investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the...
    76 KB (7,666 words) - 21:44, 23 May 2025
  • hardware obfuscation modifies the design in such a away that the resulting architecture becomes un-obvious to an adversary. Hardware Obfuscation can be...
    8 KB (1,115 words) - 02:32, 26 December 2024
  • Thumbnail for Reverse engineering
    anti-tamper technology like obfuscation is used to deter both reverse engineering and re-engineering of proprietary software and software-powered systems. In...
    57 KB (7,376 words) - 23:22, 2 June 2025
  • The Obfuscated Perl Contest was a competition for programmers of Perl which was held annually between 1996 and 2000. Entrants to the competition aimed...
    2 KB (253 words) - 02:41, 9 October 2024
  • Software companies focusing on the development of open-source software (OSS) employ a variety of business models to solve the challenge of making profits...
    72 KB (8,334 words) - 13:32, 24 May 2025
  • Thumbnail for International Obfuscated C Code Contest
    out zero bytes, equivalent to its source code. In the effort to take obfuscation to its extremes, contestants have produced programs which skirt around...
    23 KB (2,874 words) - 07:37, 26 February 2025
  • Code morphing (category Software obfuscation)
    Code morphing is an approach used in obfuscating software to protect software applications from reverse engineering, analysis, modifications, and cracking...
    3 KB (309 words) - 01:03, 5 November 2024
  • general notions of obfuscation, in particular, to Black-box obfuscation, proven to be impossible, and to Indistinguishability obfuscation, constructed recently...
    20 KB (2,481 words) - 12:46, 21 October 2024
  • Sam Spade is a discontinued Windows software tool designed to assist in tracking down sources of e-mail spam. The same name was also used for a related...
    3 KB (312 words) - 13:19, 6 December 2024
  • Thumbnail for Skype
    Skype (redirect from Skype (software))
    Erik; John, Wolfgang (27 July 2010). "Breaking and Improving Protocol Obfuscation" (PDF). Technical Report. ISSN 1652-926X. "Skype's new super wideband...
    100 KB (9,263 words) - 23:22, 31 May 2025
  • Thumbnail for Snaptube
    Snaptube (category 2014 software)
    engage in this fraudulent ad activity and uses chains of redirection and obfuscation to hide its activity. Jacobs, Jesse (2020-06-17). "SnapTube: Why you...
    4 KB (355 words) - 19:01, 16 April 2025
  • debugging and logging calls. Dotfuscator — a code obfuscator for .NET. ProGuard (software) — a code obfuscator for Java. "DashO Pro - Java Application/Applet...
    3 KB (220 words) - 15:26, 24 June 2024
  • used to avoid censorship, especially when configured to use traffic obfuscation techniques. A censor may be able to detect and block use of circumvention...
    46 KB (4,265 words) - 04:15, 29 May 2025
  • Gray-box testing (category Software testing)
    understand the requirements and verify its correctness. Object-oriented software consists primarily of objects; where objects are single indivisible units...
    9 KB (1,036 words) - 22:35, 28 November 2024
  • Content delivery network vendors, such as Cloudflare, offer email address obfuscation services to their clients. "Transparent name mangling" involves replacing...
    10 KB (1,026 words) - 22:44, 19 February 2025
  • Thumbnail for Nouveau (software)
    Nvidia video cards and the Tegra family of SoCs written by independent software engineers, with minor help from Nvidia employees. The project's goal is...
    21 KB (1,851 words) - 09:57, 1 May 2025
  • person, via the support system. Re-sales were possible with Game Object Obfuscation, or GOO for short. GOO is GameStop's client-free DRM solution which allows...
    9 KB (892 words) - 12:53, 10 December 2024