Obfuscation Principles
Introduction

Origins of Obfuscation



Obfuscation's Function for Static Evasion


Object Concatenation






Obfuscation's Function for Analysis Deception


Code Flow and Logic


Arbitrary Control Flow Patterns

Protecting and Stripping Identifiable Information













Conclusion

Last updated