to obfuscation in natural language, code obfuscation may involve using unnecessarily roundabout ways to write statements. Programmers often obfuscate code...
18 KB (1,668 words) - 15:19, 26 April 2025
indistinguishability obfuscation (abbreviated IO or iO) is a type of software obfuscation with the defining property that obfuscating any two programs that...
23 KB (2,298 words) - 12:53, 10 October 2024
Security through obscurity (redirect from Security by obfuscation)
to know Obfuscation (software) Secure by design AACS encryption key controversy Full disclosure (computer security) Code talker Obfuscation Concealment...
14 KB (1,408 words) - 10:41, 8 April 2025
criteria at a specified time Software development process – Process by which software is developed Obfuscation (software) – Deliberate creation of...
6 KB (695 words) - 21:22, 5 December 2024
cryptography, black-box obfuscation was a proposed cryptographic primitive which would allow a computer program to be obfuscated in a way such that it was...
7 KB (979 words) - 14:23, 8 March 2025
ProGuard (redirect from ProGuard (software))
open-source software portal Computer programming portal Java (programming language) Program optimization Obfuscation (software) Dotfuscator DashO (software) "Eric...
4 KB (252 words) - 05:59, 20 December 2024
Computing platform (redirect from Platform in Software)
or software platform is the infrastructure on which software is executed. While the individual components of a computing platform may be obfuscated under...
10 KB (972 words) - 05:56, 21 May 2025
Malware (redirect from Malicious software)
investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the...
76 KB (7,587 words) - 11:47, 9 May 2025
Code morphing (category Software obfuscation)
Code morphing is an approach used in obfuscating software to protect software applications from reverse engineering, analysis, modifications, and cracking...
3 KB (309 words) - 01:03, 5 November 2024
Proprietary software is software that grants its creator, publisher, or other rightsholder or rightsholder partner a legal monopoly by modern copyright...
44 KB (4,905 words) - 02:51, 22 May 2025
followed is a "good boy". Proprietary software developers are constantly developing techniques such as code obfuscation, encryption, and self-modifying code...
25 KB (2,765 words) - 16:43, 10 May 2025
Anti-tamper software is software which makes it harder for an attacker to modify it. The measures involved can be passive such as obfuscation to make reverse...
8 KB (890 words) - 23:10, 1 May 2025
Undetectable.ai) is an artificial intelligence content detection and modification software designed to identify and alter artificially generated text, such as that...
10 KB (835 words) - 05:24, 19 May 2025
communication by making it difficult to understand. Obfuscation may also refer to: Obfuscation (software), creating code that is intentionally difficult for...
487 bytes (101 words) - 15:22, 26 April 2025
server-side software is closed-source and proprietary. Pavel Durov said that it would require a major architectural redesign of the server-side software to connect...
213 KB (19,110 words) - 21:47, 20 May 2025
Software companies focusing on the development of open-source software (OSS) employ a variety of business models to solve the challenge of making profits...
72 KB (8,334 words) - 23:19, 1 May 2025
The Obfuscated Perl Contest was a competition for programmers of Perl which was held annually between 1996 and 2000. Entrants to the competition aimed...
2 KB (253 words) - 02:41, 9 October 2024
out zero bytes, equivalent to its source code. In the effort to take obfuscation to its extremes, contestants have produced programs which skirt around...
23 KB (2,874 words) - 07:37, 26 February 2025
general notions of obfuscation, in particular, to Black-box obfuscation, proven to be impossible, and to Indistinguishability obfuscation, constructed recently...
20 KB (2,481 words) - 12:46, 21 October 2024
Skype (redirect from Skype (software))
Erik; John, Wolfgang (27 July 2010). "Breaking and Improving Protocol Obfuscation" (PDF). Technical Report. ISSN 1652-926X. "Skype's new super wideband...
100 KB (9,237 words) - 16:49, 19 May 2025
Sam Spade is a discontinued Windows software tool designed to assist in tracking down sources of e-mail spam. The same name was also used for a related...
3 KB (312 words) - 13:19, 6 December 2024
Gray-box testing (category Software testing)
understand the requirements and verify its correctness. Object-oriented software consists primarily of objects; where objects are single indivisible units...
9 KB (1,036 words) - 22:35, 28 November 2024
hardware obfuscation modifies the design in such a away that the resulting architecture becomes un-obvious to an adversary. Hardware Obfuscation can be...
8 KB (1,115 words) - 02:32, 26 December 2024
Adversarial stylometry (redirect from Authorship obfuscation)
imitation typically succeeds at masking more characteristics than obfuscation. Automated obfuscation may require large amounts of training data written by the...
32 KB (3,785 words) - 04:46, 11 November 2024
construction of integrated obfuscation schemes to protect key functions in large software systems. Another approach to increase software diversity of protection...
7 KB (818 words) - 20:50, 1 September 2023
KeePass (category Software that uses Mono (software))
authentication, and has a Secure Desktop mode. It can use a two-channel auto-type obfuscation feature to offer additional protection against keyloggers. KeePass can...
17 KB (1,648 words) - 05:22, 14 March 2025
viewed but usually not altered. The term is used in systems engineering, software engineering, and in intelligent user interface design, where it is closely...
3 KB (335 words) - 19:32, 26 January 2025
EDonkey network (section Server software)
eD2k protocol extensions are "peer exchange among clients", "protocol obfuscation" and support for files larger than four gigabytes, etc. The other eD2k...
19 KB (2,262 words) - 06:45, 23 April 2025
Address munging (redirect from Email address obfuscation)
Content delivery network vendors, such as Cloudflare, offer email address obfuscation services to their clients. "Transparent name mangling" involves replacing...
10 KB (1,026 words) - 22:44, 19 February 2025
Nvidia video cards and the Tegra family of SoCs written by independent software engineers, with minor help from Nvidia employees. The project's goal is...
21 KB (1,851 words) - 09:57, 1 May 2025