A. Mez, O. And, and C. ¸. Koç, Trace-driven cache attacks on aes (short paper), Information and Communications Security, pp.112-121, 2006.

A. , B. Madou, M. De-sutter, B. De-bus, B. De-bosschere et al., Program obfuscation: a quantitative approach, Proceedings of the 2007 ACM workshop on Quality of protection, pp.15-20, 2007.

A. , R. J. And, and A. Heifetz, Incomplete information. Handbook of game theory with economic applications 3, pp.1665-1686, 2002.

J. Bonneau and I. And-mironov, Cache-Collision Timing Attacks Against AES, Cryptographic Hardware and Embedded Systems-CHES 2006, pp.201-215, 2006.
DOI : 10.1007/11894063_16

B. , B. B. And-hakala, and R. M. , Cache-timing template attacks, Advances in Cryptology? ASIACRYPT 2009, pp.667-684, 2009.

B. , B. B. And-tuveri, and N. , Remote timing attacks are still practical, Computer Security? ESORICS 2011, pp.355-371, 2011.

B. , S. Urnberger, S. Sadeghi, A. And-schneider, and T. , Twin clouds: Secure cloud computing with low latency, Communications and Multimedia Security, pp.32-44, 2011.

C. , V. And, and D. Sankoff, Longest common subsequences of two random sequences, Journal of Applied Probability, pp.306-315, 1975.

C. , C. And-nagra, and J. , Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection, 2009.

C. , C. Thomborson, C. And-low, and D. , A taxonomy of obfuscating transformations, 1997.

C. , J. Lenharth, A. Dhurjati, D. And-adve, and V. , Secure virtual architecture: A safe execution environment for commodity operating systems, In ACM SIGOPS Operating Systems Review, vol.41, pp.351-366, 2007.

G. , D. Shamir, A. And-tromer, and E. , Rsa key extraction via low-bandwidth acoustic cryptanalysis, Cryptology ePrint Archive, 2013.

G. , R. Gentry, C. And-parno, and B. , Non-interactive verifiable computing: Outsourcing computation to untrusted workers, Advances in Cryptology?CRYPTO 2010, pp.465-482, 2010.

G. , C. And-halevi, and S. , Implementing gentrys fully-homomorphic encryption scheme, Advances in Cryptology?EUROCRYPT 2011, pp.129-148, 2011.

G. , D. Bangerter, E. And-krenn, and S. , Cache games?bringing access-based cache attacks on aes to practice, Security and Privacy (SP), 2011 IEEE Symposium on. IEEE, pp.490-505, 2011.

H. , M. And-el-mahdy, and A. , Cloud protection by obfuscation: Techniques and metrics, P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2012 Seventh International Conference on. IEEE, pp.369-372, 2012.

H. , M. El-mahdy, A. Shoukry, A. Rohou, and E. , Ojit: A novel secure remote execution technology by obfuscated just-in-time compilation, European LLVM Conf, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00909766

K. , S. R. And, and S. Jenkins, Information theory-based software metrics and obfuscation, Journal of Systems and Software, vol.72, issue.2, pp.179-186, 2004.

K. , P. Jaffe, J. And-jun, and B. , Differential power analysis, Advances in Cryptology- CRYPTO99, pp.388-397, 1999.

M. , M. And-montford, and N. , A box, darkly: Obfuscation, weird languages, and code aesthetics, Proceedings of the 6th Digital Arts and Culture Conference, pp.144-153, 2005.

M. , J. M. Li, Y. Qu, N. Zhou, Z. Datta et al., Trustvisor: Efficient tcb reduction and attestation, Security and Privacy (SP), 2010 IEEE Symposium on. IEEE, pp.143-158, 2010.

M. Measure and . Software, http://theory.stanford, 2014.

N. , M. And, and J. Seifert, Advances on access-driven cache attacks on aes, Selected Areas in Cryptography, pp.147-162, 2007.

R. , T. Tromer, E. Shacham, H. And, and S. Savage, Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, Proceedings of the 16th ACM conference on Computer and communications security, pp.199-212, 2009.

S. , S. Wilkerson, D. S. And, and A. Aiken, Winnowing: local algorithms for document fingerprinting, Proceedings of the 2003 ACM SIGMOD international conference on Management of data, pp.76-85, 2003.

S. , M. I. Lanzi, A. Giffin, J. T. And-lee, and W. , Impeding malware analysis using conditional code obfuscation, NDSS, 2008.

S. , N. P. And, and F. Vercauteren, Fully homomorphic encryption with relatively small key and ciphertext sizes, Public Key Cryptography?PKC 2010, pp.420-443, 2010.

S. , J. Heiderich, M. Jensen, M. Schwenk, J. Gruschka et al., All your clouds are belong to us, STANDARD PERFORMANCE EVALUATION CORPORATION. SPEC Benchmarks, 2011.

Y. , I. And-yim, and K. , Malware obfuscation techniques: A brief survey, BWCCA, pp.297-300, 2010.

Z. , D. And-lekkas, and D. , Addressing cloud computing security issues, Future Generation Computer Systems, vol.28, issue.3, pp.583-592, 2012.

S. Const, Offset From GEP Pass 54 Lower Aggr. Copies Pass 55 Allocation Hoisting 56 Global Base Register Pass 57 Cleanup Local Dynamic TLS Pass Table I: List of used transformations