Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDMA_2021_14_a29, author = {V. V. Lebedev}, title = {Control {Flow} {Flattening} deobfuscation using symbolic execution}, journal = {Prikladnaya Diskretnaya Matematika. Supplement}, pages = {134--138}, publisher = {mathdoc}, number = {14}, year = {2021}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDMA_2021_14_a29/} }
V. V. Lebedev. Control Flow Flattening deobfuscation using symbolic execution. Prikladnaya Diskretnaya Matematika. Supplement, no. 14 (2021), pp. 134-138. http://geodesic.mathdoc.fr/item/PDMA_2021_14_a29/
[1] Wang C., Hill J., Knight J., Davidson J., Software Tamper Resistance: Obstructing Static Analysis of Programs, Technical Report, University of Virginia, USA, 2000
[2] Boyer R. S., Elspas B., Levitt K. N., “SELECT — a formal system for testing and debugging programs by symbolic execution”, Proc. Intern. Conf. Reliable Software, Association for Computing Machinery, Los Angeles, California, 1975, 234–245 | DOI
[3] Kan Z., Wang H., Wu L., et al., Automated Deobfuscation of Android Native Binary Code, 2020, arXiv: 1907.06828
[4] Peter Garba, Matteo Favaro, “SATURN — software deobfuscation framework based on LLVM”, 3rd Intern. Workshop Software Protection (Nov. 2019, London), arXiv: 1909.01752
[5] Shoshitaishvili Y., Wang R., Salls C., et al., “SOK: (State of) The art of war: Offensive techniques in binary analysis”, IEEE Symp. Security Privacy, 2016, 138–157