@article{PDMA_2021_14_a29,
author = {V. V. Lebedev},
title = {Control {Flow} {Flattening} deobfuscation using symbolic execution},
journal = {Prikladnaya Diskretnaya Matematika. Supplement},
pages = {134--138},
year = {2021},
number = {14},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/PDMA_2021_14_a29/}
}
V. V. Lebedev. Control Flow Flattening deobfuscation using symbolic execution. Prikladnaya Diskretnaya Matematika. Supplement, no. 14 (2021), pp. 134-138. http://geodesic.mathdoc.fr/item/PDMA_2021_14_a29/
[1] Wang C., Hill J., Knight J., Davidson J., Software Tamper Resistance: Obstructing Static Analysis of Programs, Technical Report, University of Virginia, USA, 2000
[2] Boyer R. S., Elspas B., Levitt K. N., “SELECT — a formal system for testing and debugging programs by symbolic execution”, Proc. Intern. Conf. Reliable Software, Association for Computing Machinery, Los Angeles, California, 1975, 234–245 | DOI
[3] Kan Z., Wang H., Wu L., et al., Automated Deobfuscation of Android Native Binary Code, 2020, arXiv: 1907.06828
[4] Peter Garba, Matteo Favaro, “SATURN — software deobfuscation framework based on LLVM”, 3rd Intern. Workshop Software Protection (Nov. 2019, London), arXiv: 1909.01752
[5] Shoshitaishvili Y., Wang R., Salls C., et al., “SOK: (State of) The art of war: Offensive techniques in binary analysis”, IEEE Symp. Security Privacy, 2016, 138–157