TODO 未完成
Task 1 Introduction
Task 2 Origins of Obfuscation
Task 3 Obfuscation's Function for Static Evasion
Task 4 Object Concatenation
Task 5 Obfuscation's Function for Analysis Deception
Task 6 Code Flow and Logic
Task 7 Arbitrary Control Flow Patterns
Task 9 Conclusion