• 1. The Development Lifecycle in the Age of Obfuscation
  • 2. Resolving the Identity Crisis - Defining the "Obfuscation Boundary"
  • 3. How the Process Works
  • 4. Relationship with Mixins
  • 4.1 Handling Obfuscation of Shadow Fields and Methods
  • 4.2 Obfuscation of Other Mixin Features
  • 5. The Nitty Gritty
  • 5.1 "Hard" and "Soft" Obfuscated References
  • 5.1.1 The Mixin Reference Map ("refmap")
  • 5.2 Runtime Deobfuscation and Mixins
  • 5.3 Unpredictable Member Names - The Curse of Synthetic Shenanigans
  • 5.3.1 Aliases