[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review

S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä… - Information and …, 2018 - Elsevier
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …

Loki: Hardening code obfuscation against automated attacks

M Schloegel, T Blazytko, M Contag… - 31st USENIX Security …, 2022 - usenix.org
Software obfuscation is a crucial technology to protect intellectual property and manage
digital rights within our society. Despite its huge practical importance, both commercial and …

{AntiFuzz}: Impeding Fuzzing Audits of Binary Executables

E Güler, C Aschermann, A Abbasi, T Holz - 28th USENIX Security …, 2019 - usenix.org
A general defense strategy in computer security is to increase the cost of successful attacks
in both computational resources as well as human time. In the area of binary security, this is …

Divilar: Diversifying intermediate language for anti-repackaging on android platform

W Zhou, Z Wang, Y Zhou, X Jiang - … of the 4th ACM Conference on Data …, 2014 - dl.acm.org
App repackaging remains a serious threat to the emerging mobile app ecosystem. Previous
solutions have mostly focused on the postmortem detection of repackaged apps by …

VMAttack: deobfuscating virtualization-based packed binaries

A Kalysch, J Götzfried, T Müller - … of the 12th International Conference on …, 2017 - dl.acm.org
We present VMAttack, a deobfuscation tool for virtualization-packed binaries based on
automated static and dynamic analysis, which offers a simplified view of the disassembly …

[HTML][HTML] Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling

K Kuang, Z Tang, X Gong, D Fang, X Chen, Z Wang - Computers & Security, 2018 - Elsevier
Code virtualization built upon virtual machine (VM) technologies is emerging as a viable
method for implementing code obfuscation to protect programs against unauthorized …

Control flow graph flattening device and method

C Salmon-Legagneur, A Monsifrot - US Patent 9,904,526, 2018 - Google Patents
Abstract Control Flow Graph flattening of a function comprising a plurality of basic blocks
having an address and at least one instruction. A processor creates a jump table associating …

[HTML][HTML] SENinja: A symbolic execution plugin for Binary Ninja

L Borzacchiello, E Coppa, C Demetrescu - SoftwareX, 2022 - Elsevier
Symbolic execution is a program analysis technique that aims to automatically identify
interesting inputs for an application, using them to generate program executions covering …

Technical Report: Hardening Code Obfuscation Against Automated Attacks

M Schloegel, T Blazytko, M Contag… - arXiv preprint arXiv …, 2021 - arxiv.org
Software obfuscation is a crucial technology to protect intellectual property and manage
digital rights within our society. Despite its huge practical importance, both commercial and …

DynOpVm: VM-based software obfuscation with dynamic opcode mapping

X Cheng, Y Lin, D Gao, C Jia - … , ACNS 2019, Bogota, Colombia, June 5–7 …, 2019 - Springer
VM-based software obfuscation has emerged as an effective technique for program
obfuscation. Despite various attempts in improving its effectiveness and security, existing VM …