Tamper resistant software: an implementation, Information Hiding, 1996. ,
DOI : 10.1007/3-540-61996-8_49
Analyzing Memory Dccesses in x86 Executables, International Conference on Compiler Construction, 2004. ,
DOI : 10.21236/ada449077
Code obfuscation techniques for metamorphic viruses, Journal in Computer Virology, vol.49, issue.1, 2008. ,
DOI : 10.1007/s11416-008-0084-2
URL : https://hal.archives-ouvertes.fr/hal-00353061
BAP: A Binary Analysis Platform, Computer aided verification, 2011. ,
DOI : 10.1007/978-3-642-14295-6_27
Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs, USENIX Symposium on Operating System Design and Implementation (OSDI), 2008. ,
A Taxonomy of Obfuscating Transformations, 1997. ,
Deobfuscation of virtualization-obfuscated software, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, 2011. ,
DOI : 10.1145/2046707.2046739
Z3: An Efficient SMT Solver, International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), 2008. ,
Mov Is Turing-Complete, 2013. ,
Recommendation for Block Cipher Modes of Operation, 2001. ,
Hydan: Hiding Information in Program Binaries, 2004. ,
DOI : 10.1007/978-3-540-30191-2_15
URL : http://www1.cs.columbia.edu/~angelos/Papers/hydan.pdf
A Retargetable C Compiler: Design and Implementation, 1995. ,
Matryoshka: Strengthening Software Protection via Nested Virtual Machines, 2015 IEEE/ACM 1st International Workshop on Software Protection, 2015. ,
DOI : 10.1109/SPRO.2015.11
Obfuscator-LLVM -- Software Protection for the Masses, 2015 IEEE/ACM 1st International Workshop on Software Protection, 2015. ,
DOI : 10.1109/SPRO.2015.10
Advanced Windows Software Protection Systems ,
Unpacking Virtualization Obfuscators, Workshop on Offensive Technologies (WOOT), 2009. ,
CUTE: A Concolic Unit Testing Engine for C, European Symposium on Research in Computer Security, 2005. ,
DOI : 10.21236/ada482657
Automatic Reverse Engineering of Malware Emulators, 2009 30th IEEE Symposium on Security and Privacy, 2009. ,
DOI : 10.1109/SP.2009.27
URL : http://www-static.cc.gatech.edu/%7Egiffin/papers/oakland09/SLG%2B09.pdf
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware, Proceedings 2015 Network and Distributed System Security Symposium, 2015. ,
DOI : 10.14722/ndss.2015.23294
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis, 2016 IEEE Symposium on Security and Privacy (SP), 2015. ,
DOI : 10.1109/SP.2016.17
Software Tamper Resistance: Obstructing Static Analysis of Programs, 2000. ,
Software Tamper Resistance: Obstructing Static Analysis of Programs, 2000. ,
Linear Obfuscation to Combat Symbolic Execution, European Symposium on Research in Computer Security, 2011. ,
DOI : 10.1145/1315245.1315261
A Generic Approach to Automatic Deobfuscation of Executable Code, 2015 IEEE Symposium on Security and Privacy, 2015. ,
DOI : 10.1109/SP.2015.47