News

The International Obfuscated C Contest – the contest to create the most useful, useless, or unique program in absolutely unreadable C code – has just posted the winners of the 2013 contest. Of ...
The International Obfuscated C Contest – the contest to create the most useful, useless, or unique program in absolutely unreadable C code – has just posted the winners of the 2013 cont… ...
The Finjan report provides several examples of dynamic code obfuscation techniques identified by Finjan's MCRC as an especially insidious threat that undermines the ability of security vendors ...
Malicious Code Hidden in Rich Content Files Tough To Detect, According to Finjan Report. By Dian Schaffhauser; 09/26/08; Finjan, a company that sells security products, said it has uncovered examples ...
Recently, researchers at Huntress Labs discovered another TrickBot sample that used a similar batch script with over 40 lines of obfuscated code.
The creators behind the long-running Internet contest to write bizarre and unnecessarily complex C programming code, called the International Obfuscated C Code Contest (IOCCC), have resurrected ...
Code obfuscation is different in essence from hardware obfuscation, ... 1 Overview 2 Application hardening 3 Recreational obfuscation 3.1 Examples 4 Step by step 4.1 Rewrite for as while.
Over 25% of malicious JavaScript code is obfuscated by so-called 'packers', a software packaging method that has given attackers a way of evading signature-based detection, according to security ...