Combating Control Flow Linearization
Open Access
- 4 May 2017
- conference paper
- conference paper
- Published by Springer Science and Business Media LLC in IFIP Advances in Information and Communication Technology
Abstract
No abstract availableThis publication has 17 references indexed in Scilit:
- Matryoshka: Strengthening Software Protection via Nested Virtual MachinesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Obfuscator-LLVM -- Software Protection for the MassesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Deobfuscation of virtualization-obfuscated softwarePublished by Association for Computing Machinery (ACM) ,2011
- BAP: A Binary Analysis PlatformLecture Notes in Computer Science, 2011
- Code obfuscation techniques for metamorphic virusesJournal of Computer Virology and Hacking Techniques, 2008
- Z3: An Efficient SMT SolverLecture Notes in Computer Science, 2008
- CUTEPublished by Association for Computing Machinery (ACM) ,2005
- Hydan: Hiding Information in Program BinariesLecture Notes in Computer Science, 2004
- Analyzing Memory Accesses in x86 ExecutablesLecture Notes in Computer Science, 2004
- Tamper resistant software: an implementationLecture Notes in Computer Science, 1996