Separation Logic for Small-Step cminor, 20th Int. Conference on Theorem Proving in Higher Order Logics, pp.5-21, 2007. ,
DOI : 10.1007/978-3-540-74591-4_3
URL : https://hal.archives-ouvertes.fr/inria-00165915
On the (im)possibility of obfuscating programs, CRYPTO '01: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, pp.1-18 ,
Towards a formally verified obfuscating compiler, SSP 2012 -2nd ACM SIGPLAN Software Security and Protection Workshop, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00762330
Mechanized Semantics for the Clight Subset of the C Language, Journal of Automated Reasoning, vol.29, issue.6, pp.263-288, 2009. ,
DOI : 10.1007/s10817-009-9148-3
URL : https://hal.archives-ouvertes.fr/inria-00352524
Formal Verification of a C Compiler Front-End, FM 2006: Formal Methods, 14th International Symposium on, pp.460-475, 2006. ,
DOI : 10.1007/11813040_31
URL : https://hal.archives-ouvertes.fr/inria-00106401
The tigress C diversifier/obfuscator, pp.2014-2015 ,
Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection, 2009. ,
Watermarking, tamper-proofing, and obfuscation - tools for software protection, IEEE Transactions on Software Engineering, vol.28, issue.8, pp.735-746, 2002. ,
DOI : 10.1109/TSE.2002.1027797
Specifying Imperative Data Obfuscations, Information Security, 10th International Conference Proceedings, pp.299-314, 2007. ,
DOI : 10.1007/978-3-540-75496-1_20
Obfuscator-LLVM -- Software Protection for the Masses, 2015 IEEE/ACM 1st International Workshop on Software Protection, pp.3-9, 2015. ,
DOI : 10.1109/SPRO.2015.10
Formal verification of a realistic compiler, Communications of the ACM, vol.52, issue.7, pp.107-115, 2009. ,
DOI : 10.1145/1538788.1538814
URL : https://hal.archives-ouvertes.fr/inria-00415861
A Formally Verified Compiler Back-end, Journal of Automated Reasoning, vol.27, issue.1, pp.363-446, 2009. ,
DOI : 10.1007/s10817-009-9155-4
URL : https://hal.archives-ouvertes.fr/inria-00360768
Mechanized Semantics for Compiler Verification, Programming Languages and Systems, 10th Asian Symposium, APLAS 2012, pp.386-388, 2012. ,
DOI : 10.1007/978-3-642-35182-2_27
URL : https://hal.archives-ouvertes.fr/hal-01079337
Formal Verification of a C-like Memory Model and Its Uses for Verifying Program Transformations, Journal of Automated Reasoning, vol.17, issue.5???6, 2008. ,
DOI : 10.1007/s10817-008-9099-0
URL : https://hal.archives-ouvertes.fr/inria-00289542
A compiler-based infrastructure for software-protection, Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security , PLAS '08, pp.33-44, 2008. ,
DOI : 10.1145/1375696.1375702
Obfuscation of executable code to improve resistance to static disassembly, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, pp.290-299, 2003. ,
DOI : 10.1145/948109.948149
A security architecture for survivability mechanisms, 2001. ,
A Technique for High-Performance Data Compression, Computer, vol.17, issue.6, pp.8-19, 1984. ,
DOI : 10.1109/MC.1984.1659158