obfuscate

(redirected from obfuscations)
Also found in: Dictionary, Thesaurus, Medical.
Related to obfuscations: obfuscatory

obfuscate

To make unclear or to confuse. See obfuscator and email obfuscator.
References in periodicals archive ?
Since software developers mostly protect their codes/binaries against reverse engineering by employing various obfuscation techniques, it is implausible to find a clean code/binary in a malware analysis case or even a commercial program.
To analyze packed binaries or malware, a good understanding of the obfuscation techniques is a necessity.
Obfuscation: A User's Guide for Privacy and Protest
Utilizing the programmability and flexibility of SDN, CHAOS obfuscates the attack surface including host mutation obfuscation, ports obfuscation, and obfuscation based on decoy servers thereby enhancing the unpredictability of the networking environment.
And what other obfuscations are we encouraging in relation to other medical practices because we decided to use the brain death criterion in the absence of any agreed-on definition of death?
Patterson offers sharp observations on the political obfuscations of some contemporary commentators, from Allen Bloom to certain deconstructive critics.
Armed with Marxist analysis, one could cut through all the obfuscations of ideology and get down to the real core of politics-material interests.
"We are face to face with an enemy who refuses to acknowledge and recognize the truth and uses every means lies and obfuscations to undermine our just struggle," they said.
Despite their "assurances" there would actually be an alternative place for bowlers, the truth about their obfuscations is revealed for what it really is.
AS obfuscations go, it could not have been more bewildering.
After all the scandal, Blair's obfuscations over Iraq and the effective removal of meaningful debate, I can never vote for New Labour again.
On the other hand there are a lot of conventional dongle vendors and users, so our investigation and experiments were intended to show, if it was possible to implement good copy protection using dongles without code execution in combination with other well known software protection techniques, like software packers, anti-debugging, code obfuscation and so on.