Protecting software through obfuscation: Can it keep pace with progress in code analysis?

S Schrittwieser, S Katzenbeisser, J Kinder… - Acm computing surveys …, 2016 - dl.acm.org
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …

A tutorial on software obfuscation

S Banescu, A Pretschner - Advances in Computers, 2018 - Elsevier
Protecting a digital asset once it leaves the cyber trust boundary of its creator is a
challenging security problem. The creator is an entity which can range from a single person …

S2E: A platform for in-vivo multi-path analysis of software systems

V Chipounov, V Kuznetsov, G Candea - Acm Sigplan Notices, 2011 - dl.acm.org
This paper presents S2E, a platform for analyzing the properties and behavior of software
systems. We demonstrate S2E's use in developing practical tools for comprehensive …

Code obfuscation against symbolic execution attacks

S Banescu, C Collberg, V Ganesh… - Proceedings of the …, 2016 - dl.acm.org
Code obfuscation is widely used by software developers to protect intellectual property, and
malware writers to hamper program analysis. However, there seems to be little work on …

Syntia: Synthesizing the semantics of obfuscated code

T Blazytko, M Contag, C Aschermann… - 26th USENIX Security …, 2017 - usenix.org
Current state-of-the-art deobfuscation approaches operate on instruction traces and use a
mixed approach of symbolic execution and taint analysis; two techniques that require …

Loki: Hardening code obfuscation against automated attacks

M Schloegel, T Blazytko, M Contag… - 31st USENIX Security …, 2022 - usenix.org
Software obfuscation is a crucial technology to protect intellectual property and manage
digital rights within our society. Despite its huge practical importance, both commercial and …

Symbolic deobfuscation: From virtualized code back to the original

J Salwan, S Bardin, ML Potet - … Conference on Detection of Intrusions and …, 2018 - Springer
Software protection has taken an important place during the last decade in order to protect
legit software against reverse engineering or tampering. Virtualization is considered as one …

Control flow obfuscation for android applications

V Balachandran, DJJ Tan, VLL Thing - Computers & Security, 2016 - Elsevier
Android apps are vulnerable to reverse engineering, which makes app tampering and
repackaging relatively easy. While obfuscation is widely known to make reverse engineering …

VMHunt: A verifiable approach to partially-virtualized binary code simplification

D Xu, J Ming, Y Fu, D Wu - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
Code virtualization is a highly sophisticated obfuscation technique adopted by malware
authors to stay under the radar. However, the increasing complexity of code virtualization …

How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections)

M Ollivier, S Bardin, R Bonichon… - Proceedings of the 35th …, 2019 - dl.acm.org
Code obfuscation is a major tool for protecting software intellectual property from attacks
such as reverse engineering or code tampering. Yet, recently proposed (automated) attacks …