Skip to search formSkip to main contentSkip to account menu

Obfuscation (software)

Known as: Obfuscator, Obfuscated code, Obfuscating software 
In software development, manual obfuscation is the deliberate act of creating obfuscated code, i.e. source or machine code that is difficult for… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Location check-ins contain both geographical and semantic information about the visited venues, in the form of tags (e.g… 
2013
2013
In the Internet age, every computer user is likely to inadvertently encounter highly contagious viruses. Over the past several… 
2011
2011
Metamorphic viruses engage different mutation techniques to escape from string signature based scanning. They try to change their… 
2007
2007
A node-exhaustion-safe intrusion-tolerant distributed system is a system that assuredly does not suffer more than the assumed… 
2006
2006
Multimedia security schemes often combine cryptographic schemes with information hiding techniques such as steganography or… 
2006
2006
Three novel control computation (control flow) obfuscation methods are described for protecting Java class files. They are basic… 
2004
2004
In May 2001, from the losing end of a fierce internal power dispute, the president of the Brazilian Senate publicly admitted to… 
2002
2002
This document presents an analysis of various program obfuscation techniques performed as part of the Self-Protecting Mobile… 
1998
1998
The pursuer-evader (PE) game is recognized as an important domain in which to study the coevolution of robust adaptive behavior… 
1984
1984
The objectives of this study were to investigate the influence of nectar re- sources on: (1) territory establishment, (2…