to obfuscation in natural language, code obfuscation may involve using unnecessarily roundabout ways to write statements. Programmers often obfuscate code...
18 KB (1,668 words) - 15:19, 26 April 2025
indistinguishability obfuscation (abbreviated IO or iO) is a type of software obfuscation with the defining property that obfuscating any two programs that...
23 KB (2,298 words) - 12:53, 10 October 2024
criteria at a specified time Software development process – Process by which software is developed Obfuscation (software) – Deliberate creation of...
6 KB (695 words) - 21:22, 5 December 2024
Security through obscurity (redirect from Security by obfuscation)
to know Obfuscation (software) Secure by design AACS encryption key controversy Full disclosure (computer security) Code talker Obfuscation Concealment...
14 KB (1,408 words) - 10:41, 8 April 2025
ProGuard (redirect from ProGuard (software))
open-source software portal Computer programming portal Java (programming language) Program optimization Obfuscation (software) Dotfuscator DashO (software) "Eric...
4 KB (252 words) - 05:59, 20 December 2024
communication by making it difficult to understand. Obfuscation may also refer to: Obfuscation (software), creating code that is intentionally difficult for...
487 bytes (101 words) - 15:22, 26 April 2025
Computing platform (redirect from Platform in Software)
or software platform is the infrastructure on which software is executed. While the individual components of a computing platform may be obfuscated under...
10 KB (972 words) - 16:48, 5 March 2025
Malware (redirect from Malicious software)
investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the...
76 KB (7,587 words) - 11:47, 9 May 2025
cryptography, black-box obfuscation was a proposed cryptographic primitive which would allow a computer program to be obfuscated in a way such that it was...
7 KB (979 words) - 14:23, 8 March 2025
Proprietary software is software that grants its creator, publisher, or other rightsholder or rightsholder partner a legal monopoly by modern copyright...
44 KB (4,905 words) - 00:11, 12 May 2025
server-side software is closed-source and proprietary. Pavel Durov said that it would require a major architectural redesign of the server-side software to connect...
213 KB (19,111 words) - 13:08, 13 May 2025
followed is a "good boy". Proprietary software developers are constantly developing techniques such as code obfuscation, encryption, and self-modifying code...
25 KB (2,765 words) - 16:43, 10 May 2025
Undetectable.ai) is an artificial intelligence content detection and modification software designed to identify and alter artificially generated text, such as that...
10 KB (835 words) - 17:31, 16 April 2025
hardware obfuscation modifies the design in such a away that the resulting architecture becomes un-obvious to an adversary. Hardware Obfuscation can be...
8 KB (1,115 words) - 02:32, 26 December 2024
The Obfuscated Perl Contest was a competition for programmers of Perl which was held annually between 1996 and 2000. Entrants to the competition aimed...
2 KB (253 words) - 02:41, 9 October 2024
Software companies focusing on the development of open-source software (OSS) employ a variety of business models to solve the challenge of making profits...
72 KB (8,334 words) - 23:19, 1 May 2025
Skype (redirect from Skype (software))
Erik; John, Wolfgang (27 July 2010). "Breaking and Improving Protocol Obfuscation" (PDF). Technical Report. ISSN 1652-926X. "Skype's new super wideband...
99 KB (9,228 words) - 14:40, 13 May 2025
Code morphing (category Software obfuscation)
Code morphing is an approach used in obfuscating software to protect software applications from reverse engineering, analysis, modifications, and cracking...
3 KB (309 words) - 01:03, 5 November 2024
Anti-tamper software is software which makes it harder for an attacker to modify it. The measures involved can be passive such as obfuscation to make reverse...
8 KB (890 words) - 23:10, 1 May 2025
general notions of obfuscation, in particular, to Black-box obfuscation, proven to be impossible, and to Indistinguishability obfuscation, constructed recently...
20 KB (2,481 words) - 12:46, 21 October 2024
out zero bytes, equivalent to its source code. In the effort to take obfuscation to its extremes, contestants have produced programs which skirt around...
23 KB (2,874 words) - 07:37, 26 February 2025
Sam Spade is a discontinued Windows software tool designed to assist in tracking down sources of e-mail spam. The same name was also used for a related...
3 KB (312 words) - 13:19, 6 December 2024
person, via the support system. Re-sales were possible with Game Object Obfuscation, or GOO for short. GOO is GameStop's client-free DRM solution which allows...
9 KB (892 words) - 12:53, 10 December 2024
Gray-box testing (category Software testing)
understand the requirements and verify its correctness. Object-oriented software consists primarily of objects; where objects are single indivisible units...
9 KB (1,036 words) - 22:35, 28 November 2024
EDonkey network (section Server software)
eD2k protocol extensions are "peer exchange among clients", "protocol obfuscation" and support for files larger than four gigabytes, etc. The other eD2k...
19 KB (2,262 words) - 06:45, 23 April 2025
Internet censorship circumvention (redirect from List of software for internet censorship circumvention)
used to avoid censorship, especially when configured to use traffic obfuscation techniques. A censor may be able to detect and block use of circumvention...
47 KB (4,278 words) - 08:21, 16 April 2025
Keygen (redirect from Key changer (software))
Win32/Autorun Win32/Dorkbot Win32/Obfuscator A key changer or keychan is a variation of a keygen. A keychan is a small piece of software that changes the license...
8 KB (877 words) - 09:22, 2 May 2025
This list of Apache Software Foundation projects contains the software development projects of The Apache Software Foundation (ASF). Besides the projects...
41 KB (4,631 words) - 23:25, 10 May 2025
Reverse engineering (redirect from Reverse engineering of software)
anti-tamper technology like obfuscation is used to deter both reverse engineering and re-engineering of proprietary software and software-powered systems. In...
56 KB (7,094 words) - 14:44, 11 May 2025
Snaptube (category 2014 software)
engage in this fraudulent ad activity and uses chains of redirection and obfuscation to hide its activity. Jacobs, Jesse (2020-06-17). "SnapTube: Why you...
4 KB (355 words) - 19:01, 16 April 2025