. Quarkslab, Epona -code and data obfuscation to protect everywhere, www. quarkslab.com, 2016.

P. Junod, J. Rinaldini, J. Wehrli, and J. Michielin, Obfuscator-LLVM -- Software Protection for the Masses, 2015 IEEE/ACM 1st International Workshop on Software Protection, pp.3-9, 2015.
DOI : 10.1109/SPRO.2015.10

O. Technologies and . Themida, Advanced windows software protection system, 2013.

C. Collberg, S. Martin, J. Myers, and J. Nagra, Distributed application tamper detection via continuous software updates, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12, pp.319-328
DOI : 10.1145/2420950.2420997

S. Udupa, S. Debray, and M. Madou, Deobfuscation: Reverse Engineering Obfuscated Code, 12th Working Conference on Reverse Engineering (WCRE'05), 2005.
DOI : 10.1109/WCRE.2005.13

URL : http://profs.sci.univr.it/~giaco/download/Watermarking-Obfuscation/unflatten.pdf

B. Yadegari and S. Debray, Symbolic Execution of Obfuscated Code, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.732-744
DOI : 10.1145/2810103.2813663

B. Yadegari, B. Johannesmeyer, B. Whitely, and S. Debray, A Generic Approach to Automatic Deobfuscation of Executable Code, 2015 IEEE Symposium on Security and Privacy, pp.674-691, 2015.
DOI : 10.1109/SP.2015.47

J. Cappaert and B. , A general model for hiding control flow, Proceedings of the tenth annual ACM workshop on Digital rights management, DRM '10, pp.35-42, 2010.
DOI : 10.1145/1866870.1866877

A. Biryukov and A. Shamir, Structural Cryptanalysis of SASAS, Journal of Cryptology, vol.23, issue.4, pp.505-518, 2010.
DOI : 10.1007/s00145-010-9062-1

URL : http://www.iacr.org/archive/eurocrypt2001/20450392.pdf

O. Billet, H. Gilbert, and C. Ech-chatbi, Selected Areas in Cryptography: 11th International Workshop, pp.227-240, 2004.

S. Drape, Intellectual Property Protection using Obfuscation, 2010.

. Irdeto, Cloaked CA solution, www.irdeto.com, 2014.

Y. Zhou, A. Main, Y. X. Gu, and H. Johnson, Information Hiding in Software with Mixed Boolean-Arithmetic Transforms
DOI : 10.1007/3-540-68671-1_4

R. Balaniuk, Drill and Join: A Method for Exact Inductive Program Synthesis, Lecture Notes in Computer Science, vol.8981, pp.219-237, 2014.
DOI : 10.1007/978-3-319-17822-6_13

J. Ming, D. Xu, L. Wang, and D. Wu, LOOP, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.757-768, 2015.
DOI : 10.1109/ISSRE.2014.18

C. Lattner and V. Adve, LLVM: A compilation framework for lifelong program analysis & transformation, International Symposium on Code Generation and Optimization, 2004. CGO 2004., 2004.
DOI : 10.1109/CGO.2004.1281665

C. Cadar, D. Dunbar, D. Engler, and K. , Unassisted and automatic generation of high-coverage tests for complex systems programs, Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation , OSDI'08, USENIX Association, pp.209-224, 2008.

F. Haedicke, S. Frehse, G. Fey, D. Große, and R. Drechsler, metaSMT: Focus on your application not on solver integration, Proceedings of the First International Workshop on Design and Implementation of Formal Tools and Systems of CEUR Workshop Proceedings, CEUR-WS.org, 2011.

V. Ganesh and D. L. Dill, A Decision Procedure for Bit-Vectors and Arrays, Proceedings of the 19th International Conference on Computer Aided Verification, CAV'07, pp.519-531, 2007.
DOI : 10.1007/978-3-540-73368-3_52

URL : http://morpheus.cs.ucdavis.edu/languages/dp-vectors-arrays.pdf

L. De-moura and N. Bjørner, Z3: An efficient SMT solver, in: Proceedings of the Theory and Practice of Software, 14th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS'08/ETAPS'08, pp.337-340, 2008.

R. Brummayer and A. Biere, Boolector: An Efficient SMT Solver for Bit-Vectors and Arrays, Proceedings of the 15th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS '09, pp.174-177, 2009.
DOI : 10.1007/978-3-540-78800-3_24

URL : http://fmv.jku.at/papers/BrummayerBiere-TACAS09.pdf

V. Chipounov, V. Kuznetsov, and G. Candea, S2e: a platform for in-vivo multipath analysis of software systems

A. Guinet, N. Eyrolles, and M. Videau, Arybo: Manipulation, canonicalization and identification of mixed boolean-arithmetic symbolic expressions, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01390528

C. Mougey and F. Gabriel, Drm obfuscation versus auxiliary attacks, 2014.

F. Biondi, S. Josse, and A. Legay, Comparative evaluation of the effectiveness of constraint solvers against opaque conditionals, 2015 IEEE Symposium on, 2015.

F. Biondi, S. Josse, A. Legay, and T. Sirvent, Effectiveness of Synthesis in Concolic Deobfuscation URL: https, 2015.

S. Hada, Zero-Knowledge and Code Obfuscation, Advances in Cryptology -ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security Proceedings, pp.443-457, 2000.
DOI : 10.1007/3-540-44448-3_34

URL : http://profs.sci.univr.it/~giaco/download/Watermarking-Obfuscation/zero-knowledge obfuscation 2.pdf

B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai et al., On the (im)possibility of obfuscating programs, Electronic Colloquium on Computational Complexity (ECCC), vol.8, 2001.

S. Garg, C. Gentry, S. Halevi, M. Raykova, A. Sahai et al., Candidate indistinguishability obfuscation and functional encryption for all circuits, 54th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2013, pp.40-49, 2013.
DOI : 10.1109/focs.2013.13

URL : http://cr.yp.to/talks/2013.12.28/slides-dan+nadia+tanja-20131228-16x9.pdf

Z. Brakerski and G. N. Rothblum, Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding, Theory of Cryptography -11th Theory of Cryptography Conference, pp.1-25, 2014.
DOI : 10.1007/978-3-642-54242-8_1

URL : http://eprint.iacr.org/2013/563.pdf

B. Barak, S. Garg, Y. T. Kalai, O. Paneth, and A. Sahai, Protecting Obfuscation against Algebraic Attacks, Advances in Cryptology -EUROCRYPT 2014 -33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.221-238, 2014.
DOI : 10.1007/978-3-642-55220-5_13

S. Banescu, M. Ochoa, N. Kunze, and A. Pretschner, Idea: Benchmarking Indistinguishability Obfuscation ??? A Candidate Implementation, Engineering Secure Software and Systems - 7th International Symposium Proceedings, pp.149-156, 2015.
DOI : 10.1007/978-3-319-15618-7_12

C. S. Collberg and C. Thomborson, Watermarking, tamper-proofing, and obfuscation-tools for software protection, Software Engineering, IEEE Transactions on, vol.28, pp.735-746, 2002.
DOI : 10.1109/tse.2002.1027797

URL : http://www.cs.auckland.ac.nz/~cthombor/Pubs/01027797a.pdf

C. Wang, A security architecture for survivability mechanisms, 2001.
DOI : 10.18130/v32n5c

URL : ftp://ftp.cs.virginia.edu/pub/dissertations/2001-01.ps.Z

S. K. Udupa, S. K. Debray, and M. Madou, Deobfuscation: Reverse Engineering Obfuscated Code, 12th Working Conference on Reverse Engineering (WCRE'05), pp.45-54, 2005.
DOI : 10.1109/WCRE.2005.13

URL : http://profs.sci.univr.it/~giaco/download/Watermarking-Obfuscation/unflatten.pdf

Z. Wang, J. Ming, C. Jia, and D. Gao, Linear Obfuscation to Combat Symbolic Execution, Computer Security - ESORICS 2011 -16th European Symposium on Research in Computer Security, pp.210-226, 2011.
DOI : 10.1145/1315245.1315261

J. Kinder, Static analysis of x86 executables (Statische Analyse von Programmen in x86-Maschinensprache), 2010.

J. Kinder, Towards Static Analysis of Virtualization-Obfuscated Binaries, 2012 19th Working Conference on Reverse Engineering, pp.61-70, 2012.
DOI : 10.1109/WCRE.2012.16

URL : http://dslab.epfl.ch/pubs/staticVirtObf.pdf

J. Kinder and D. Kravchenko, Alternating Control Flow Reconstruction, Verification, Model Checking , and Abstract Interpretation -13th International Conference, VM- CAI 2012 Proceedings, pp.267-282, 2012.
DOI : 10.1007/978-0-387-44599-1_2

URL : http://dslab.epfl.ch/pubs/alternatingCFR.pdf

J. Kinder and H. Veith, Jakstab: A Static Analysis Platform for Binaries, Computer Aided Verification, 20th International Conference Proceedings, pp.423-427, 2008.
DOI : 10.1007/978-3-540-70545-1_40

URL : http://www.cs.rhul.ac.uk/home/kinder/papers/cav08.pdf

S. Schrittwieser, S. Katzenbeisser, J. Kinder, G. Merzdovnik, and E. R. , Protecting Software through Obfuscation, ACM Computing Surveys, vol.49, issue.1, p.49, 2016.
DOI : 10.1145/1023833.1023873

C. Collberg, C. Thomborson, and D. Low, A taxonomy of obfuscating transformations, 1997.

B. Coppens, B. D. Sutter, and J. Maebe, Feedback-driven binary code diversification, 2013.
DOI : 10.1145/2400682.2400683

J. Palsberg, S. Krishnaswamy, M. Kwon, D. Ma, Q. Shao et al., Experience with software watermarking, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00), pp.11-15, 2000.
DOI : 10.1109/ACSAC.2000.898885

URL : http://www.cerias.purdue.edu/ssl/techreports-ssl/2004-30.pdf

D. Xu, J. Ming, and D. Wu, Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method, Information Security -19th International Conference, 2016.
DOI : 10.1109/DSN.2001.941405

M. D. Preda, M. Madou, K. D. Bosschere, and R. Giacobazzi, Opaque Predicates Detection by Abstract Interpretation, Algebraic Methodology and Software Technology, 11th International Conference Proceedings, pp.81-9510, 1007.
DOI : 10.1007/11784180_9

S. Chow, P. Eisen, H. Johnson, and P. C. Oorschot, A White-Box DES Implementation for DRM Applications, Proceedings of ACM CCS-9
DOI : 10.1007/978-3-540-44993-5_1

URL : http://profs.sci.univr.it/~giaco/download/Watermarking-Obfuscation/cloackware-lncs.pdf

J. Vanegue and S. Heelan, SMT solvers in software security, 6th USENIX Workshop on Offensive Technologies, WOOT'12, pp.85-96, 2012.

P. Godefroid, M. Y. Levin, and D. Molnar, SAGE, Communications of the ACM, vol.55, issue.3, pp.40-44, 2012.
DOI : 10.1145/2093548.2093564