Obfuscation

Results: 1117



#Item
451Obfuscated code / Obfuscation / Source code / Jan Willem Klop / Computer programming / Computing / Software engineering

Spec Data Overall Size 5 1/2” x” x 1/2” 7 1/4” x” x 1/2” 10 1/2” x” x 1/2”

Add to Reading List

Source URL: www.ludowici.com

Language: English - Date: 2015-01-22 09:48:44
452Software engineering / Computer security / SoftICE / Obfuscation / Source code / OllyDbg / Obfuscated code / VirusTotal.com / Computer virus / Computer programming / Computing / Debuggers

Analysis and Visualization of Common Packers PowerOfCommunity, Seoul Ero Carrera - Reverse Engineer at zynamics GmbH Chief Research Officer at VirusTotal

Add to Reading List

Source URL: powerofcommunity.net

Language: English - Date: 2008-11-15 11:15:26
453Obfuscated code / Obfuscation / Source code / Four-square cipher / Classical cipher / Computer programming / Computing / Software engineering

ALMA ROAD Sludio 10. LevelLt Collins Streel Tmfo@ten23 com au

Add to Reading List

Source URL: www.portphillip.vic.gov.au

Language: English - Date: 2014-12-03 23:40:13
454Obfuscated code / Obfuscation / Source code

I N T E R N AT I O N A L F I L M S E R I E S SCREENING IN 2 VENUES ON THE CU BOULDER CAMPUS THURSDAY ONLY IFS

Add to Reading List

Source URL: www.ifsfan.com

Language: English - Date: 2015-04-03 16:33:04
455Obfuscated code / Obfuscation / Source code / Basic hypergeometric series / Q-analogs / Hypergeometric functions / Nonassociative algebra

#"$" UR      !

Add to Reading List

Source URL: www.thi.informatik.uni-frankfurt.de

Language: English - Date: 2007-09-14 10:05:54
456Cognition / Ethology / Malware / Analysis / Science

Malware Analysis, Software Obfuscation and the Ethics of Large Scale Malware Evaluation SBA Research & Vienna University of Technology Edgar R. Weippl

Add to Reading List

Source URL: www.nii.ac.jp

Language: English - Date: 2014-02-14 02:22:27
457Partial evaluation / Algorithm / Interpreter / Computing / Software / Software engineering / Evaluation strategy / Incremental computing

Lecture 4 on Obfuscation by Partial Evaluation of Distorted Interpreters Neil D. Jones DIKU, University of Copenhagen (prof. emeritus) Joint work with Roberto Giacobazzi and Isabella Mastroeni University of Verona

Add to Reading List

Source URL: www.nii.ac.jp

Language: English - Date: 2011-12-19 05:05:47
458Source code / Computing / Classical cipher / Computer programming / Obfuscated code / Obfuscation

The Power of Perception TM (formerly titled DATT tools) There’s  not  enough  time  in  the  day  to  do  everything  we  want  to  do.    But  what  if  you  c

Add to Reading List

Source URL: think-quick.com.au

Language: English - Date: 2014-12-20 05:27:52
459Obfuscated code / Obfuscation / Source code / Classical cipher / Computer programming / Software engineering / Computing

PDF Document

Add to Reading List

Source URL: www.twghkywc.edu.hk

Language: English - Date: 2012-09-09 22:58:01
460Obfuscation / Obfuscated code / Source code / International Obfuscated C Code Contest / J / Hardware obfuscation / Computer programming / Software engineering / Computing

Introduction to Program Obfuscation Yury Lifshits Saint-Petersburg State University http://logic.pdmi.ras.ru/˜yura/ [removed]

Add to Reading List

Source URL: yury.name

Language: English - Date: 2006-08-19 21:36:28
UPDATE