When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. ProGuard - Wikipedia

    en.wikipedia.org/wiki/ProGuard

    ProGuard is an open source command-line tool which shrinks, optimizes and obfuscates Java code. It is able to optimize bytecode as well as detect and remove unused instructions. [4] ProGuard is free software and is distributed under the GNU General Public License, version 2. [3]

  3. DashO (software) - Wikipedia

    en.wikipedia.org/wiki/DashO_(software)

    DashO is a code obfuscator, compactor [clarification needed], optimizer, watermarker [clarification needed], [2] and encryptor for Java, Kotlin and Android applications. [3] It aims to achieve little or no performance loss even as the code complexity increases. [4] [5]

  4. Obfuscation (software) - Wikipedia

    en.wikipedia.org/wiki/Obfuscation_(software)

    Additionally, deobfuscation tools exist, aiming to reverse the obfuscation process. While most commercial obfuscation solutions transform either program source code or platform-independent bytecode (as used by Java and .NET), some also work directly on compiled binaries.

  5. Code morphing - Wikipedia

    en.wikipedia.org/wiki/Code_morphing

    Code morphing is an approach used in obfuscating software to protect software applications from reverse engineering, analysis, modifications, and cracking.This technology protects intermediate level code such as compiled from Java and .NET languages (Oxygene, C#, Visual Basic, etc.) rather than binary object code.

  6. Mocha (decompiler) - Wikipedia

    en.wikipedia.org/wiki/Mocha_(decompiler)

    Mocha is a Java decompiler, which allows programmers to translate a program's bytecode into source code. A beta version of Mocha was released in 1996, by Dutch developer Hanpeter van Vliet, alongside an obfuscator named Crema. A controversy erupted and he temporarily withdrew Mocha from public distribution. [2]

  7. Apache POI - Wikipedia

    en.wikipedia.org/wiki/Apache_POI

    The Apache POI project contains the following subcomponents (meaning of acronyms is taken from old documentation): POIFS (Poor Obfuscation Implementation File System [2]) – This component reads and writes Microsoft's OLE 2 Compound document format.

  8. Anti-tamper software - Wikipedia

    en.wikipedia.org/wiki/Anti-Tamper_Software

    This type of tamper proofing defense may take the form of runtime integrity checks such as cyclic redundancy checksums, [4] anti-debugging measures, encryption or obfuscation. [5] Execution inside a virtual machine has become a common anti-tamper method used in recent years for commercial software; it is used for example in StarForce and ...

  9. Polymorphic code - Wikipedia

    en.wikipedia.org/wiki/Polymorphic_code

    Emulation may be used to defeat polymorphic obfuscation by letting the malware demangle itself in a virtual environment before utilizing other methods, such as traditional signature scanning. Such a virtual environment is sometimes called a sandbox. Polymorphism does not protect the virus against such emulation if the decrypted payload remains ...