Index of /software_protection
Name
Last modified
Size
Description
Parent Directory
-
3-540-36492-7_17.pdf
2026-02-17 07:28
277K
978-3-319-89500-0_28.pdf
2026-02-17 07:28
355K
1809.11037.pdf
2026-02-17 07:28
397K
1901.04942v1.pdf
2026-02-17 07:28
289K
1998_-_Java_control_flow_obfuscation (3).pdf
2026-02-17 07:28
892K
2008_-_An_Inter-Classes_Obfuscation_Method_For_Java_Program_ (2).pdf
2026-02-17 07:28
330K
2012FPSfoket.pdf
2026-02-17 07:28
4.0M
2012_-_JAVA_DESIGN_PATTERN_OBFUSCATION (2).pdf
2026-02-17 07:28
4.3M
2014_-_Pushing_Java_Type_Obfuscation_to_the_Limit (3).pdf
2026-02-17 07:28
3.3M
2015-753.pdf
2026-02-17 07:28
647K
2016_-_Unifying_Method_Descriptors_in_Java_Obfuscation (1).pdf
2026-02-17 07:28
3.9M
2017-787.pdf
2026-02-17 07:28
385K
2020_-_Layered_obfuscation_-_Taxonomy_ofsoftware_obfuscation_techniques_for_layeredsecurity (3).pdf
2026-02-17 07:28
2.5M
2025.findings-acl.1127.pdf
2026-02-17 07:28
731K
2505.19887v2.pdf
2026-02-17 07:28
493K
13132-cracking-string-encryption-in-java-obfuscated-bytecode.pdf
2026-02-17 07:28
113K
75068_EYROLLES_2017_archivage.pdf
2026-02-17 07:28
1.8M
2810103.2813617.pdf
2026-02-17 07:28
1.4M
20993047 (2).pdf
2026-02-17 07:28
396K
46842100-MIT.pdf
2026-02-17 07:28
2.3M
Automatic_Reverse_Engineering_of_Malware_Emulators.pdf
2026-02-17 07:28
1.4M
Hybrid_Obfuscation_Technique_to_Protect_Source_Code_From_Prohibited_Software_Reverse_Engineering.pdf
2026-02-17 07:28
3.4M
JavaDeserialization-Oakland.pdf
2026-02-17 07:28
474K
No.Starch.Press.The.IDA.Pro.Book.2nd.Edition.1593272898.pdf
2026-02-17 07:28
5.7M
OutSSA-RR.pdf
2026-02-17 07:28
325K
Software_Security_Series_Christian_Collberg_Jasvir_Nagra_-_Surreptitious_Software__Obfuscation_Watermarking_and_Tamperproofing_for_Software_Protection-Addison-Wesley_Professional_2009.pdf
2026-02-17 07:28
14M
US6668325.pdf
2026-02-17 07:28
5.3M
VCF_Virtual_Code_Folding_to_Enhance_Virtualization_Obfuscation.pdf
2026-02-17 07:28
2.0M
bar2025-final7.pdf
2026-02-17 07:28
223K
ccs-unvirtualize.pdf
2026-02-17 07:28
192K
ccs2015-symbolic.pdf
2026-02-17 07:28
375K
checksumming-attack.pdf
2026-02-17 07:28
488K
codaspy17.pdf
2026-02-17 07:28
451K
conf_2006_06.pdf
2026-02-17 07:28
339K
covert-channels.pdf
2026-02-17 07:28
466K
disasm-resist.pdf
2026-02-17 07:28
121K
douglaslow.pdf
2026-02-17 07:28
1.0M
fast_liveness.pdf
2026-02-17 07:28
232K
generic-deobf.pdf
2026-02-17 07:28
637K
hongying.pdf
2026-02-17 07:28
407K
ifcvt.pdf
2026-02-17 07:28
142K
loop-SAS.pdf
2026-02-17 07:28
302K
malware_analysts_cookbook_and_dvd_tools_and_techniques_for_fighting_malicious_code.pdf
2026-02-17 07:28
19M
opaque-isc16.pdf
2026-02-17 07:28
749K
practical_reverse_engineering_x86_x64_arm_windows_kernel_reversing_tools_and_obfuscation.pdf
2026-02-17 07:28
4.5M
rimpagliazzo_on_the_impossibility_obfuscating_programs.pdf
2026-02-17 07:28
463K
sec17-blazytko.pdf
2026-02-17 07:28
571K
sp-paper.pdf
2026-02-17 07:28
80K
unflatten.pdf
2026-02-17 07:28
153K
unpacker-extraction.pdf
2026-02-17 07:28
153K
us-18-Haken-Automated-Discovery-of-Deserialization-Gadget-Chains-wp.pdf
2026-02-17 07:28
275K
wisa05.pdf
2026-02-17 07:28
352K
Apache/2.4.66 (Debian) Server at fast-dl.top Port 80