Downloads

Name Date Author Size DL's Rating Get
Using Optimization Algorithms for Malware Deobfuscation 28 Aug 2010 : 16:50 Branko Spasojevic 762.78kB 607
0/5 : Not rated
Unpacking Virtualization Obfuscators 28 Aug 2010 : 16:51 Rolf Rolles 125.06kB 1000
0/5 : Not rated
Translingual Obfuscation 17 May 2016 : 01:18 Pei Wang, Shuai Wang, Jiang Ming, Yufei Jiang, Dinghao Wu 401.40kB 332
0/5 : Not rated
Towards a Formally Verified Obfuscating Compiler 28 Jul 2012 : 06:27 Sandrine Blazy, Roberto Giacobazzi 61.06kB 307
0/5 : Not rated
The Impossibility of Obfuscation with a Universal Simulator 06 Apr 2014 : 05:20 Henry Cohn, Shafi Goldwasser, Yael Tauman Kalai 236.45kB 403
0/5 : Not rated
The Effectiveness of Source Code Obfuscation: an Experimental Assessment 09 May 2010 : 02:09 Various Authors 110.42kB 460
0/5 : Not rated
Symbolic Execution of Obfuscated Code 17 May 2016 : 01:19 Babak Yadegari, Saumya Debray 375.20kB 468
0/5 : Not rated
Semantics-based Code Obfuscation by Abstract Interpretation 28 Jul 2012 : 06:28 Mila Dalla Preda, Roberto Giacobazzi 390.10kB 330
0/5 : Not rated
Reversing An Obfuscated Java Malware 17 May 2016 : 01:23 Extreme Coders 1.07MB 519
0/5 : Not rated
Reverse Engineering Obfuscated Code 28 Aug 2010 : 16:52 Sharath K. Udupa + Saumya K. Debray + Matias Madou 130.18kB 1029
0/5 : Not rated
Program Obfuscation 09 May 2010 : 02:10 Susan Hohenberger + Zachary Scott 111.26kB 776
0/5 : Not rated
Practical Obfuscating Programs 09 May 2010 : 02:11 Philippe Beaucamps + Eric Filio 343.37kB 656
0/5 : Not rated
On Entropy Measures for Code Obfuscation 28 Jul 2012 : 06:30 Roberto Giacobazzi, Andrea Toppan 452.49kB 492
0/5 : Not rated
Obfuscation, Weird Languages, and Code Aesthetics 09 May 2010 : 02:14 Michael Mateas + Nick Montfort 382.62kB 436
0/5 : Not rated
Obfuscation Code Localization Based on CFG Generation of Malware 17 May 2016 : 01:28 Nguyen Minh Hai, Mizuhito Ogawa, Quan Thanh Tho 524.56kB 339
0/5 : Not rated
New Perspectives in Code Obfuscation and Watermarking 28 Jul 2012 : 06:31 Roberto Giacobazzi 261.45kB 690
0/5 : Not rated
Multi-stage Binary Code Obfuscation Using Improved Virtual Machine 04 Dec 2011 : 11:43 Hui Fang, Yongdong Wu, Shuhong Wang, Yin Huang 390.21kB 465
0/5 : Not rated
Mimimorphism: A New Approach to Binary Code Obfuscation 18 Dec 2010 : 04:24 Zhenyu Wu + Steven Gianvecchio + Mengjun Xie + Haining Wang 364.52kB 771
0/5 : Not rated
Loco: An Interactive Code Deobfuscation Tool 28 Aug 2010 : 16:55 Matias Madou + Ludo Van Put + Koen De Bosschere 291.85kB 710
0/5 : Not rated
Java Source Code Obfuscation 09 May 2010 : 02:15 Praveen Sivadasan + P Sojan Lal 33.01kB 568
0/5 : Not rated
Intellectual Property Protection Using Obfuscation 18 Jun 2012 : 13:57 Stephen Drape 309.02kB 320
0/5 : Not rated
General Method of Program Code Obfuscation 09 May 2010 : 02:17 Gregory Wroblewski 683.64kB 755
0/5 : Not rated
Experiment With Control Code Obfuscation 09 May 2010 : 02:18 Song Ya-qi + LI Li 56.38kB 454
0/5 : Not rated
Exception Handling to Build Code Obfuscation Techniques 09 May 2010 : 02:20 Daniel Dolz + Gerardo Parra 389.06kB 569
0/5 : Not rated
Deobfuscation of Virtualization-Obfuscated Software 04 Dec 2011 : 11:57 Kevin Coogan, Gen Lu, Saumya Debray 182.18kB 465
0/5 : Not rated
Deobfuscation of Packed and Virtulazation-Obfuscated Protected Binaries 04 Mar 2012 : 07:40 Kevin Patrick Coogan 623.10kB 877
0/5 : Not rated
De-obfuscation and Detection of Malicious PDF Files with High Accuracy 17 Mar 2013 : 06:42 Xun Lu, Jianwei Zhuge, Ruoyu Wang 307.22kB 514
0/5 : Not rated
Control Code Obfuscation by Abstract Interpretation 28 Jul 2012 : 06:32 Mila Dalla Preda, Roberto Giacobazzi 226.26kB 430
0/5 : Not rated
Context-Sensitive Analysis of Obfuscated x86 Executables 17 May 2016 : 01:37 Arun Lakhotia, Davidson R. Boccardo, Anshuman Singh, Aleardo Manacero Jr. 245.40kB 596
0/5 : Not rated
Concepts and Techniques in Software Watermarking and Obfuscation 26 May 2011 : 13:53 William Feng Zhu 562.67kB 395
0/5 : Not rated
Return to Category List 16733 download(s) from 30 files