Obfuscation Principles

Introduction

Origins of Obfuscation

Obfuscation's Function for Static Evasion

Object Concatenation

Obfuscation's Function for Analysis Deception

Code Flow and Logic

Arbitrary Control Flow Patterns

Protecting and Stripping Identifiable Information

Conclusion

Last updated