Index of /software_protection

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]wisa05.pdf2026-02-17 07:28 352K 
[   ]us-18-Haken-Automated-Discovery-of-Deserialization-Gadget-Chains-wp.pdf2026-02-17 07:28 275K 
[   ]unpacker-extraction.pdf2026-02-17 07:28 153K 
[   ]unflatten.pdf2026-02-17 07:28 153K 
[   ]sp-paper.pdf2026-02-17 07:28 80K 
[   ]sec17-blazytko.pdf2026-02-17 07:28 571K 
[   ]rimpagliazzo_on_the_impossibility_obfuscating_programs.pdf2026-02-17 07:28 463K 
[   ]practical_reverse_engineering_x86_x64_arm_windows_kernel_reversing_tools_and_obfuscation.pdf2026-02-17 07:28 4.5M 
[   ]opaque-isc16.pdf2026-02-17 07:28 749K 
[   ]malware_analysts_cookbook_and_dvd_tools_and_techniques_for_fighting_malicious_code.pdf2026-02-17 07:28 19M 
[   ]loop-SAS.pdf2026-02-17 07:28 302K 
[   ]ifcvt.pdf2026-02-17 07:28 142K 
[   ]hongying.pdf2026-02-17 07:28 407K 
[   ]generic-deobf.pdf2026-02-17 07:28 637K 
[   ]fast_liveness.pdf2026-02-17 07:28 232K 
[   ]douglaslow.pdf2026-02-17 07:28 1.0M 
[   ]disasm-resist.pdf2026-02-17 07:28 121K 
[   ]covert-channels.pdf2026-02-17 07:28 466K 
[   ]conf_2006_06.pdf2026-02-17 07:28 339K 
[   ]codaspy17.pdf2026-02-17 07:28 451K 
[   ]checksumming-attack.pdf2026-02-17 07:28 488K 
[   ]ccs2015-symbolic.pdf2026-02-17 07:28 375K 
[   ]ccs-unvirtualize.pdf2026-02-17 07:28 192K 
[   ]bar2025-final7.pdf2026-02-17 07:28 223K 
[   ]VCF_Virtual_Code_Folding_to_Enhance_Virtualization_Obfuscation.pdf2026-02-17 07:28 2.0M 
[   ]US6668325.pdf2026-02-17 07:28 5.3M 
[   ]Software_Security_Series_Christian_Collberg_Jasvir_Nagra_-_Surreptitious_Software__Obfuscation_Watermarking_and_Tamperproofing_for_Software_Protection-Addison-Wesley_Professional_2009.pdf2026-02-17 07:28 14M 
[   ]OutSSA-RR.pdf2026-02-17 07:28 325K 
[   ]No.Starch.Press.The.IDA.Pro.Book.2nd.Edition.1593272898.pdf2026-02-17 07:28 5.7M 
[   ]JavaDeserialization-Oakland.pdf2026-02-17 07:28 474K 
[   ]Hybrid_Obfuscation_Technique_to_Protect_Source_Code_From_Prohibited_Software_Reverse_Engineering.pdf2026-02-17 07:28 3.4M 
[   ]Automatic_Reverse_Engineering_of_Malware_Emulators.pdf2026-02-17 07:28 1.4M 
[   ]46842100-MIT.pdf2026-02-17 07:28 2.3M 
[   ]20993047 (2).pdf2026-02-17 07:28 396K 
[   ]2810103.2813617.pdf2026-02-17 07:28 1.4M 
[   ]75068_EYROLLES_2017_archivage.pdf2026-02-17 07:28 1.8M 
[   ]13132-cracking-string-encryption-in-java-obfuscated-bytecode.pdf2026-02-17 07:28 113K 
[   ]2505.19887v2.pdf2026-02-17 07:28 493K 
[   ]2025.findings-acl.1127.pdf2026-02-17 07:28 731K 
[   ]2020_-_Layered_obfuscation_-_Taxonomy_ofsoftware_obfuscation_techniques_for_layeredsecurity (3).pdf2026-02-17 07:28 2.5M 
[   ]2017-787.pdf2026-02-17 07:28 385K 
[   ]2016_-_Unifying_Method_Descriptors_in_Java_Obfuscation (1).pdf2026-02-17 07:28 3.9M 
[   ]2015-753.pdf2026-02-17 07:28 647K 
[   ]2014_-_Pushing_Java_Type_Obfuscation_to_the_Limit (3).pdf2026-02-17 07:28 3.3M 
[   ]2012_-_JAVA_DESIGN_PATTERN_OBFUSCATION (2).pdf2026-02-17 07:28 4.3M 
[   ]2012FPSfoket.pdf2026-02-17 07:28 4.0M 
[   ]2008_-_An_Inter-Classes_Obfuscation_Method_For_Java_Program_ (2).pdf2026-02-17 07:28 330K 
[   ]1998_-_Java_control_flow_obfuscation (3).pdf2026-02-17 07:28 892K 
[   ]1901.04942v1.pdf2026-02-17 07:28 289K 
[   ]1809.11037.pdf2026-02-17 07:28 397K 
[   ]978-3-319-89500-0_28.pdf2026-02-17 07:28 355K 
[   ]3-540-36492-7_17.pdf2026-02-17 07:28 277K 

Apache/2.4.66 (Debian) Server at fast-dl.top Port 80