Downloads

Name Date Author Size DL's Rating Get
Using Optimization Algorithms for Malware Deobfuscation 28 Aug 2010 : 16:50 Branko Spasojevic 762.78kB 674
0/5 : Not rated
Unpacking Virtualization Obfuscators 28 Aug 2010 : 16:51 Rolf Rolles 125.06kB 1054
0/5 : Not rated
Translingual Obfuscation 17 May 2016 : 01:18 Pei Wang, Shuai Wang, Jiang Ming, Yufei Jiang, Dinghao Wu 401.40kB 373
0/5 : Not rated
Towards a Formally Verified Obfuscating Compiler 28 Jul 2012 : 06:27 Sandrine Blazy, Roberto Giacobazzi 61.06kB 333
0/5 : Not rated
The Impossibility of Obfuscation with a Universal Simulator 06 Apr 2014 : 05:20 Henry Cohn, Shafi Goldwasser, Yael Tauman Kalai 236.45kB 431
0/5 : Not rated
The Effectiveness of Source Code Obfuscation: an Experimental Assessment 09 May 2010 : 02:09 Various Authors 110.42kB 491
0/5 : Not rated
Symbolic Execution of Obfuscated Code 17 May 2016 : 01:19 Babak Yadegari, Saumya Debray 375.20kB 541
0/5 : Not rated
Semantics-based Code Obfuscation by Abstract Interpretation 28 Jul 2012 : 06:28 Mila Dalla Preda, Roberto Giacobazzi 390.10kB 357
0/5 : Not rated
Reversing An Obfuscated Java Malware 17 May 2016 : 01:23 Extreme Coders 1.07MB 570
0/5 : Not rated
Reverse Engineering Obfuscated Code 28 Aug 2010 : 16:52 Sharath K. Udupa + Saumya K. Debray + Matias Madou 130.18kB 1074
0/5 : Not rated
Program Obfuscation 09 May 2010 : 02:10 Susan Hohenberger + Zachary Scott 111.26kB 823
0/5 : Not rated
Practical Obfuscating Programs 09 May 2010 : 02:11 Philippe Beaucamps + Eric Filio 343.37kB 691
0/5 : Not rated
On Entropy Measures for Code Obfuscation 28 Jul 2012 : 06:30 Roberto Giacobazzi, Andrea Toppan 452.49kB 528
0/5 : Not rated
Obfuscation, Weird Languages, and Code Aesthetics 09 May 2010 : 02:14 Michael Mateas + Nick Montfort 382.62kB 462
0/5 : Not rated
Obfuscation Code Localization Based on CFG Generation of Malware 17 May 2016 : 01:28 Nguyen Minh Hai, Mizuhito Ogawa, Quan Thanh Tho 524.56kB 378
0/5 : Not rated
New Perspectives in Code Obfuscation and Watermarking 28 Jul 2012 : 06:31 Roberto Giacobazzi 261.45kB 751
0/5 : Not rated
Multi-stage Binary Code Obfuscation Using Improved Virtual Machine 04 Dec 2011 : 11:43 Hui Fang, Yongdong Wu, Shuhong Wang, Yin Huang 390.21kB 491
0/5 : Not rated
Mimimorphism: A New Approach to Binary Code Obfuscation 18 Dec 2010 : 04:24 Zhenyu Wu + Steven Gianvecchio + Mengjun Xie + Haining Wang 364.52kB 808
0/5 : Not rated
Loco: An Interactive Code Deobfuscation Tool 28 Aug 2010 : 16:55 Matias Madou + Ludo Van Put + Koen De Bosschere 291.85kB 733
0/5 : Not rated
Java Source Code Obfuscation 09 May 2010 : 02:15 Praveen Sivadasan + P Sojan Lal 33.01kB 598
0/5 : Not rated
Intellectual Property Protection Using Obfuscation 18 Jun 2012 : 13:57 Stephen Drape 309.02kB 351
0/5 : Not rated
General Method of Program Code Obfuscation 09 May 2010 : 02:17 Gregory Wroblewski 683.64kB 780
0/5 : Not rated
Experiment With Control Code Obfuscation 09 May 2010 : 02:18 Song Ya-qi + LI Li 56.38kB 474
0/5 : Not rated
Exception Handling to Build Code Obfuscation Techniques 09 May 2010 : 02:20 Daniel Dolz + Gerardo Parra 389.06kB 608
0/5 : Not rated
Deobfuscation of Virtualization-Obfuscated Software 04 Dec 2011 : 11:57 Kevin Coogan, Gen Lu, Saumya Debray 182.18kB 492
0/5 : Not rated
Deobfuscation of Packed and Virtulazation-Obfuscated Protected Binaries 04 Mar 2012 : 07:40 Kevin Patrick Coogan 623.10kB 920
0/5 : Not rated
De-obfuscation and Detection of Malicious PDF Files with High Accuracy 17 Mar 2013 : 06:42 Xun Lu, Jianwei Zhuge, Ruoyu Wang 307.22kB 538
0/5 : Not rated
Control Code Obfuscation by Abstract Interpretation 28 Jul 2012 : 06:32 Mila Dalla Preda, Roberto Giacobazzi 226.26kB 463
0/5 : Not rated
Context-Sensitive Analysis of Obfuscated x86 Executables 17 May 2016 : 01:37 Arun Lakhotia, Davidson R. Boccardo, Anshuman Singh, Aleardo Manacero Jr. 245.40kB 646
0/5 : Not rated
Concepts and Techniques in Software Watermarking and Obfuscation 26 May 2011 : 13:53 William Feng Zhu 562.67kB 425
0/5 : Not rated
Return to Category List 17858 download(s) from 30 files