DEF CON 15 - Subere - Fingerprinting and Cracking Java Obfuscated Code

29:49
DEFCON 15: Fingerprinting and Cracking Java Obfuscated Code

48:47
DEF CON 15 - Stracener and Luck - Hacking the EULA

13:56
everything is open source if you can reverse engineer (try it RIGHT NOW!)

9:09
Self-Learning Reverse Engineering in 2022

1:04:27
SeaJUG Oct 2009 : Protecting Java Code - Going Beyond Simple Obfuscation

42:37
DEF CON 32 - Listen to the Whispers: Web Timing Attacks that Actually Work - James Kettle

38:34
DEF CON 32 - Where’s the Money-Defeating ATM Disk Encryption - Matt Burch

6:54