When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Category:Software obfuscation - Wikipedia

    en.wikipedia.org/wiki/Category:Software_obfuscation

    Main page; Contents; Current events; Random article; About Wikipedia; Contact us; Help; Learn to edit; Community portal; Recent changes; Upload file

  3. Dotfuscator - Wikipedia

    en.wikipedia.org/wiki/Dotfuscator

    Dotfuscator is a tool performing a combination of code obfuscation, optimization, shrinking, and hardening on .NET, Xamarin and Universal Windows Platform apps. Ordinarily, .NET executables can easily be reverse engineered by free tools (such as ILSpy, dotPeek and JustDecompile), potentially exposing algorithms and intellectual property (trade secrets), licensing and security mechanisms.

  4. Obfuscation (software) - Wikipedia

    en.wikipedia.org/wiki/Obfuscation_(software)

    In software development, obfuscation is the practice of creating source or machine code that is intentionally difficult for humans or computers to understand. Similar to obfuscation in natural language, code obfuscation may involve using unnecessarily roundabout ways to write statements. Programmers often obfuscate code to conceal its purpose ...

  5. Executable compression - Wikipedia

    en.wikipedia.org/wiki/Executable_compression

    Software distributors use executable compression for a variety of reasons, primarily to reduce the secondary storage requirements of their software; as executable compressors are specifically designed to compress executable code, they often achieve better compression ratio than standard data compression facilities such as gzip, zip or bzip2 [citation needed].

  6. Black-box obfuscation - Wikipedia

    en.wikipedia.org/wiki/Black-box_obfuscation

    In cryptography, black-box obfuscation was a proposed cryptographic primitive which would allow a computer program to be obfuscated in a way such that it was impossible to determine anything about it except its input and output behavior. [1] Black-box obfuscation has been proven to be impossible, even in principle. [2]

  7. Talk:Obfuscation (software) - Wikipedia

    en.wikipedia.org/wiki/Talk:Obfuscation_(software)

    If your experience is mainly about the fun obfuscation contests, I can see how you would disagree. A good obfuscator is one that can generate logically identical source code that creates indentical binaries for textually different source code. Which is the exact opposite to what the article says. We have different conceptions of obfuscators.

  8. Category:Obfuscation - Wikipedia

    en.wikipedia.org/wiki/Category:Obfuscation

    Obfuscation refers to making information more difficult to understand fully and clearly. Subcategories This category has the following 15 subcategories, out of 15 total.

  9. Hardware obfuscation - Wikipedia

    en.wikipedia.org/wiki/Hardware_Obfuscation

    Hardware Obfuscation can be of two types depending on the hardware platform targeted: (a) DSP Core Hardware Obfuscation - this type of obfuscation performs certain high level transformation on the data flow graph representation of DSP core to convert it into an unknown form that reflects an un-obvious architecture at RTL or gate level.