Skip to main content

Obfuscation Principles

TODO 未完成

Task 1 Introduction

Task 2 Origins of Obfuscation

Task 3 Obfuscation's Function for Static Evasion

Task 4 Object Concatenation

Task 5 Obfuscation's Function for Analysis Deception

Task 6 Code Flow and Logic

Task 7 Arbitrary Control Flow Patterns

Task 8 Protecting and Stripping Identifiable Information

Task 9 Conclusion