Voir la notice de l'article provenant de la source Math-Net.Ru
@article{MAIS_2023_30_2_a2, author = {Y. V. Kosolapov}, title = {On simplifying expressions with mixed {Boolean-arithmetic}}, journal = {Modelirovanie i analiz informacionnyh sistem}, pages = {140--159}, publisher = {mathdoc}, volume = {30}, number = {2}, year = {2023}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/MAIS_2023_30_2_a2/} }
Y. V. Kosolapov. On simplifying expressions with mixed Boolean-arithmetic. Modelirovanie i analiz informacionnyh sistem, Tome 30 (2023) no. 2, pp. 140-159. http://geodesic.mathdoc.fr/item/MAIS_2023_30_2_a2/
[1] B. Barak et al., “On the (im)possibility of obfuscating programs”, Advances in Cryptology - CRYPTO 2001, Lecture Notes in Computer Science, 2139, Springer, 2001, 1–18 | DOI | MR | Zbl
[2] Y. Zhou, A. Main, Y. X. Gu, and H. Johnson, “Information hiding in software with mixed boolean-arithmetic transforms”, in Information Security Applications, WISA 2007, Lecture Notes in Computer Science, 4867, Springer, 2007, 61–75 | DOI
[3] S. Gulwani, O. Polozov, and R. Singh, “Program synthesis”, Foundations and Trends in Programming Languages, 4:1-2 (2017), 1–119 | DOI
[4] B. Reichenwallner and P. Meerwald-Stadler, “Efficient Deobfuscation of Linear Mixed Boolean-Arithmetic Expressions”, Proceedings of the 2022 ACM Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks, 2022, 19–28
[5] L. Zobernig, Mathematical Aspects of Program Obfuscation, PhD thesis, The University of Auckland, 2020
[6] P. Garba and M. Favaro, “Saturn-software deobfuscation framework based on LLVM”, Proceedings of the 3rd ACM Workshop on Software Protection, 2019, 27–38 | DOI
[7] N. Eyrolles, Obfuscation with Mixed Boolean-Arithmetic Expressions: reconstruction, analysis and simplification tools, PhD thesis, Université Paris-Saclay, 2017
[8] D. Xu et al., “Boosting SMT solver performance on mixed-bitwise-arithmetic expressions”, Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2021, 651–664 | Zbl
[9] B. Liu, J. Shen, J. Ming, Q. Zheng, J. Li, and D. Xu, “MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation”, Proceedings of the 30th USENIX Security Symposium, 2021, 1701–1718
[10] E. Berlekamp, R. McEliece, and H. Van Tilborg, “On the inherent intractability of certain coding problems (corresp.)”, IEEE Transactions on Information Theory, 24:3 (1978), 384–386 | DOI | MR | Zbl
[11] E. Prange, “The use of information sets in decoding cyclic codes”, IRE Transactions on Information Theory, 8:5 (1962), 5–9 | DOI | MR
[12] C. Peters, “Information-set decoding for linear codes over $mathbbF_q$”, Post-Quantum Cryptography, PQCrypto 2010, Lecture Notes in Computer Science, 6061, Springer, 2010, 81–94 | DOI | MR | Zbl
[13] V. Weger, N. Gassner, and J. Rosenthal, A survey on code-based cryptography, 2022