S. Blazy and R. Giacobazzi, Towards a formally verified obfuscating compiler, SSP 2012-2nd ACM SIGPLAN Software Security and Protection Workshop, Christian Collberg, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00762330

S. Blazy and X. Leroy, Mechanized semantics for the Clight subset of the C language, Journal of Automated Reasoning, vol.43, pp.263-288, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00352524

S. Blazy and A. Trieu, Formal verification of control-flow graph flattening, Proceedings of the 5th ACM SIGPLAN Conference on Certified Programs and Proofs, pp.176-187, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01242063

C. Collberg, The Tigress C Diversifier/Obfuscator, 2014.

C. Collberg and J. Nagra, Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection, 2009.

S. Christian, C. Collberg, and . Thomborson, Watermarking, tamper-proofing, and obfuscation-tools for software protection, IEEE Transactions on software engineering, vol.28, pp.735-746, 2002.

S. Drape, C. D. Thomborson, and A. Majumdar, Specifying Imperative Data Obfuscations, Information Security, p.10, 2007.

N. E. , Obfuscation with Mixed Boolean-Arithmetic Expressions : reconstruction, analysis and simplification tools, Ph.D. Dissertation, 2017.

N. Eyrolles, L. Goubin, and M. Videau, Defeating MBA-based Obfuscation, Proceedings of the 2016 ACM Workshop on Software PROtection. ACM, pp.27-38, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01388109

P. Junod, J. Rinaldini, J. Wehrli, and J. Michielin, Obfuscator-LLVM-Software Protection for the Masses, Proceedings of the IEEE/ACM 1st International Workshop on Software Protection, SPRO'15, pp.3-9, 2015.

X. Leroy, Formal verification of a realistic compiler, Commun. ACM, vol.52, pp.107-115, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00415861

X. Leroy, A formally verified compiler back-end, Journal of Automated Reasoning, vol.43, pp.363-446, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00360768

, The CompCert formally verified compiler, 2008.

, The Coq proof assistant reference manual, 2018.

H. S. Warren, Hacker's Delight, 2012.

Y. Zhou and A. Main, Diversity via Code Transformations: A Solution for NGNA Renewable Security, The National Cable and Telecommunications Association Show, pp.173-182, 2006.

Y. Zhou, A. Main, X. Yuan, H. Gu, and . Johnson, Information hiding in software with mixed boolean-arithmetic transforms, International Workshop on Information Security Applications, pp.61-75, 2007.