Epona -code and data obfuscation to protect everywhere, www. quarkslab.com, 2016. ,
Obfuscator-LLVM -- Software Protection for the Masses, 2015 IEEE/ACM 1st International Workshop on Software Protection, pp.3-9, 2015. ,
DOI : 10.1109/SPRO.2015.10
Advanced windows software protection system, 2013. ,
Distributed application tamper detection via continuous software updates, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12, pp.319-328 ,
DOI : 10.1145/2420950.2420997
Deobfuscation: Reverse Engineering Obfuscated Code, 12th Working Conference on Reverse Engineering (WCRE'05), 2005. ,
DOI : 10.1109/WCRE.2005.13
URL : http://profs.sci.univr.it/~giaco/download/Watermarking-Obfuscation/unflatten.pdf
Symbolic Execution of Obfuscated Code, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.732-744 ,
DOI : 10.1145/2810103.2813663
A Generic Approach to Automatic Deobfuscation of Executable Code, 2015 IEEE Symposium on Security and Privacy, pp.674-691, 2015. ,
DOI : 10.1109/SP.2015.47
A general model for hiding control flow, Proceedings of the tenth annual ACM workshop on Digital rights management, DRM '10, pp.35-42, 2010. ,
DOI : 10.1145/1866870.1866877
Structural Cryptanalysis of SASAS, Journal of Cryptology, vol.23, issue.4, pp.505-518, 2010. ,
DOI : 10.1007/s00145-010-9062-1
URL : http://www.iacr.org/archive/eurocrypt2001/20450392.pdf
Selected Areas in Cryptography: 11th International Workshop, pp.227-240, 2004. ,
Intellectual Property Protection using Obfuscation, 2010. ,
Cloaked CA solution, www.irdeto.com, 2014. ,
Information Hiding in Software with Mixed Boolean-Arithmetic Transforms ,
DOI : 10.1007/3-540-68671-1_4
Drill and Join: A Method for Exact Inductive Program Synthesis, Lecture Notes in Computer Science, vol.8981, pp.219-237, 2014. ,
DOI : 10.1007/978-3-319-17822-6_13
LOOP, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.757-768, 2015. ,
DOI : 10.1109/ISSRE.2014.18
LLVM: A compilation framework for lifelong program analysis & transformation, International Symposium on Code Generation and Optimization, 2004. CGO 2004., 2004. ,
DOI : 10.1109/CGO.2004.1281665
Unassisted and automatic generation of high-coverage tests for complex systems programs, Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation , OSDI'08, USENIX Association, pp.209-224, 2008. ,
metaSMT: Focus on your application not on solver integration, Proceedings of the First International Workshop on Design and Implementation of Formal Tools and Systems of CEUR Workshop Proceedings, CEUR-WS.org, 2011. ,
A Decision Procedure for Bit-Vectors and Arrays, Proceedings of the 19th International Conference on Computer Aided Verification, CAV'07, pp.519-531, 2007. ,
DOI : 10.1007/978-3-540-73368-3_52
URL : http://morpheus.cs.ucdavis.edu/languages/dp-vectors-arrays.pdf
Z3: An efficient SMT solver, in: Proceedings of the Theory and Practice of Software, 14th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS'08/ETAPS'08, pp.337-340, 2008. ,
Boolector: An Efficient SMT Solver for Bit-Vectors and Arrays, Proceedings of the 15th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS '09, pp.174-177, 2009. ,
DOI : 10.1007/978-3-540-78800-3_24
URL : http://fmv.jku.at/papers/BrummayerBiere-TACAS09.pdf
S2e: a platform for in-vivo multipath analysis of software systems ,
Arybo: Manipulation, canonicalization and identification of mixed boolean-arithmetic symbolic expressions, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01390528
Drm obfuscation versus auxiliary attacks, 2014. ,
Comparative evaluation of the effectiveness of constraint solvers against opaque conditionals, 2015 IEEE Symposium on, 2015. ,
Effectiveness of Synthesis in Concolic Deobfuscation URL: https, 2015. ,
Zero-Knowledge and Code Obfuscation, Advances in Cryptology -ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security Proceedings, pp.443-457, 2000. ,
DOI : 10.1007/3-540-44448-3_34
URL : http://profs.sci.univr.it/~giaco/download/Watermarking-Obfuscation/zero-knowledge obfuscation 2.pdf
On the (im)possibility of obfuscating programs, Electronic Colloquium on Computational Complexity (ECCC), vol.8, 2001. ,
Candidate indistinguishability obfuscation and functional encryption for all circuits, 54th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2013, pp.40-49, 2013. ,
DOI : 10.1109/focs.2013.13
URL : http://cr.yp.to/talks/2013.12.28/slides-dan+nadia+tanja-20131228-16x9.pdf
Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding, Theory of Cryptography -11th Theory of Cryptography Conference, pp.1-25, 2014. ,
DOI : 10.1007/978-3-642-54242-8_1
URL : http://eprint.iacr.org/2013/563.pdf
Protecting Obfuscation against Algebraic Attacks, Advances in Cryptology -EUROCRYPT 2014 -33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.221-238, 2014. ,
DOI : 10.1007/978-3-642-55220-5_13
Idea: Benchmarking Indistinguishability Obfuscation ??? A Candidate Implementation, Engineering Secure Software and Systems - 7th International Symposium Proceedings, pp.149-156, 2015. ,
DOI : 10.1007/978-3-319-15618-7_12
Watermarking, tamper-proofing, and obfuscation-tools for software protection, Software Engineering, IEEE Transactions on, vol.28, pp.735-746, 2002. ,
DOI : 10.1109/tse.2002.1027797
URL : http://www.cs.auckland.ac.nz/~cthombor/Pubs/01027797a.pdf
A security architecture for survivability mechanisms, 2001. ,
DOI : 10.18130/v32n5c
URL : ftp://ftp.cs.virginia.edu/pub/dissertations/2001-01.ps.Z
Deobfuscation: Reverse Engineering Obfuscated Code, 12th Working Conference on Reverse Engineering (WCRE'05), pp.45-54, 2005. ,
DOI : 10.1109/WCRE.2005.13
URL : http://profs.sci.univr.it/~giaco/download/Watermarking-Obfuscation/unflatten.pdf
Linear Obfuscation to Combat Symbolic Execution, Computer Security - ESORICS 2011 -16th European Symposium on Research in Computer Security, pp.210-226, 2011. ,
DOI : 10.1145/1315245.1315261
Static analysis of x86 executables (Statische Analyse von Programmen in x86-Maschinensprache), 2010. ,
Towards Static Analysis of Virtualization-Obfuscated Binaries, 2012 19th Working Conference on Reverse Engineering, pp.61-70, 2012. ,
DOI : 10.1109/WCRE.2012.16
URL : http://dslab.epfl.ch/pubs/staticVirtObf.pdf
Alternating Control Flow Reconstruction, Verification, Model Checking , and Abstract Interpretation -13th International Conference, VM- CAI 2012 Proceedings, pp.267-282, 2012. ,
DOI : 10.1007/978-0-387-44599-1_2
URL : http://dslab.epfl.ch/pubs/alternatingCFR.pdf
Jakstab: A Static Analysis Platform for Binaries, Computer Aided Verification, 20th International Conference Proceedings, pp.423-427, 2008. ,
DOI : 10.1007/978-3-540-70545-1_40
URL : http://www.cs.rhul.ac.uk/home/kinder/papers/cav08.pdf
Protecting Software through Obfuscation, ACM Computing Surveys, vol.49, issue.1, p.49, 2016. ,
DOI : 10.1145/1023833.1023873
A taxonomy of obfuscating transformations, 1997. ,
Feedback-driven binary code diversification, 2013. ,
DOI : 10.1145/2400682.2400683
Experience with software watermarking, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00), pp.11-15, 2000. ,
DOI : 10.1109/ACSAC.2000.898885
URL : http://www.cerias.purdue.edu/ssl/techreports-ssl/2004-30.pdf
Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method, Information Security -19th International Conference, 2016. ,
DOI : 10.1109/DSN.2001.941405
Opaque Predicates Detection by Abstract Interpretation, Algebraic Methodology and Software Technology, 11th International Conference Proceedings, pp.81-9510, 1007. ,
DOI : 10.1007/11784180_9
A White-Box DES Implementation for DRM Applications, Proceedings of ACM CCS-9 ,
DOI : 10.1007/978-3-540-44993-5_1
URL : http://profs.sci.univr.it/~giaco/download/Watermarking-Obfuscation/cloackware-lncs.pdf
SMT solvers in software security, 6th USENIX Workshop on Offensive Technologies, WOOT'12, pp.85-96, 2012. ,
SAGE, Communications of the ACM, vol.55, issue.3, pp.40-44, 2012. ,
DOI : 10.1145/2093548.2093564