D. Aucsmith, Tamper resistant software: an implementation, Information Hiding, 1996.
DOI : 10.1007/3-540-61996-8_49

G. Balakrishnan and T. Reps, Analyzing Memory Dccesses in x86 Executables, International Conference on Compiler Construction, 2004.
DOI : 10.21236/ada449077

J. Borello and L. Mé, Code obfuscation techniques for metamorphic viruses, Journal in Computer Virology, vol.49, issue.1, 2008.
DOI : 10.1007/s11416-008-0084-2

URL : https://hal.archives-ouvertes.fr/hal-00353061

D. Brumley, I. Jager, T. Avgerinos, and E. J. Schwartz, BAP: A Binary Analysis Platform, Computer aided verification, 2011.
DOI : 10.1007/978-3-642-14295-6_27

C. Cadar, D. Dunbar, and D. R. Engler, Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs, USENIX Symposium on Operating System Design and Implementation (OSDI), 2008.

C. Collberg, C. Thomborson, and D. Low, A Taxonomy of Obfuscating Transformations, 1997.

K. Coogan, G. Lu, and S. Debray, Deobfuscation of virtualization-obfuscated software, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, 2011.
DOI : 10.1145/2046707.2046739

L. , D. Moura, and N. Bjørner, Z3: An Efficient SMT Solver, International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), 2008.

S. Dolan, Mov Is Turing-Complete, 2013.

M. Dworkin, Recommendation for Block Cipher Modes of Operation, 2001.

R. El-khalil and A. D. Keromytis, Hydan: Hiding Information in Program Binaries, 2004.
DOI : 10.1007/978-3-540-30191-2_15

URL : http://www1.cs.columbia.edu/~angelos/Papers/hydan.pdf

C. Fraser and D. Hanson, A Retargetable C Compiler: Design and Implementation, 1995.

S. Ghosh, J. D. Hiser, and J. W. Davidson, Matryoshka: Strengthening Software Protection via Nested Virtual Machines, 2015 IEEE/ACM 1st International Workshop on Software Protection, 2015.
DOI : 10.1109/SPRO.2015.11

P. Junod, J. Rinaldini, J. Wehrli, and J. Michielin, Obfuscator-LLVM -- Software Protection for the Masses, 2015 IEEE/ACM 1st International Workshop on Software Protection, 2015.
DOI : 10.1109/SPRO.2015.10

O. Technologies and . Themida, Advanced Windows Software Protection Systems

R. Rolles, Unpacking Virtualization Obfuscators, Workshop on Offensive Technologies (WOOT), 2009.

K. Sen, D. Marinov, and G. Agha, CUTE: A Concolic Unit Testing Engine for C, European Symposium on Research in Computer Security, 2005.
DOI : 10.21236/ada482657

M. Sharif, A. Lanzi, J. Giffin, and W. Lee, Automatic Reverse Engineering of Malware Emulators, 2009 30th IEEE Symposium on Security and Privacy, 2009.
DOI : 10.1109/SP.2009.27

URL : http://www-static.cc.gatech.edu/%7Egiffin/papers/oakland09/SLG%2B09.pdf

Y. Shoshitaishvili, R. Wang, C. Hauser, C. Kruegel, and G. V. Vigna, Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware, Proceedings 2015 Network and Distributed System Security Symposium, 2015.
DOI : 10.14722/ndss.2015.23294

Y. Shoshitaishvili, R. Wang, C. Salls, N. Stephens, M. Polino et al., SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis, 2016 IEEE Symposium on Security and Privacy (SP), 2015.
DOI : 10.1109/SP.2016.17

C. Wang, J. Hill, J. Knight, and J. Davidson, Software Tamper Resistance: Obstructing Static Analysis of Programs, 2000.

C. Wang, J. Hill, J. Knight, and J. Davidson, Software Tamper Resistance: Obstructing Static Analysis of Programs, 2000.

Z. Wang, J. Ming, C. Jia, and D. Gao, Linear Obfuscation to Combat Symbolic Execution, European Symposium on Research in Computer Security, 2011.
DOI : 10.1145/1315245.1315261

B. Yadegari, B. Johannesmeyer, B. Whitely, and S. Debray, A Generic Approach to Automatic Deobfuscation of Executable Code, 2015 IEEE Symposium on Security and Privacy, 2015.
DOI : 10.1109/SP.2015.47