Control flow obfuscation: Control Flow obfuscation significantly alters the normal flow of a program.
This obfuscation technique makes memory dumping quite harder mainly by use of encryption technologies.
String encryption: This obfuscation method makes it difficult for a software cracker to understand the logic of the code, as he cannot identify the text of messages or other used strings, making it much harder to determine where to patch the code.
Figure 6, shows a control flow graph of one of the sample binaries while Figure 7, depicts the control flow graph of the same binary after applying the CFG obfuscation using ConfuserEx tool.
We propose that a conceptual revolution based upon trust is a better path forward than one based on obfuscation.
Obfuscation aims to spark a rebellion by the weak and powerless using whatever tools are available for resistance.
Obfuscation is one part a saboteur's user manual and one part an exploration of the ethics of that sabotage.
Brunton and Nissenbaum explicitly aim to start an obfuscation revolution.
In this case only obfuscation protection was enabled.
This is quite sophisticated tool, which allows many obfuscation options to make obfuscated code very hard to understand.
This group of experiments showed, that code obfuscation almost does not add any significant additional protection for the dongle-based protection solutions.
The security dongle without code execution ability was used for experimental evaluation combining it with additional protection methods including code obfuscation, anti-reverse engineering and code packing.