Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDMA_2021_14_a30, author = {R. K. Lebedev and I. A. Koryakin}, title = {Application of x86 extensions for code protection}, journal = {Prikladnaya Diskretnaya Matematika. Supplement}, pages = {138--140}, publisher = {mathdoc}, number = {14}, year = {2021}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDMA_2021_14_a30/} }
R. K. Lebedev; I. A. Koryakin. Application of x86 extensions for code protection. Prikladnaya Diskretnaya Matematika. Supplement, no. 14 (2021), pp. 138-140. http://geodesic.mathdoc.fr/item/PDMA_2021_14_a30/
[1] Junod P., Rinaldini J., Wehrli J., Michielin J., “Obfuscator-LLVM — software protection for the masses”, 2015 IEEE/ACM 1st Intern. Workshop Software Protection, 2015, 3–9
[2] Wang Z., Ming J., Jia C., Gao D., “Linear obfuscation to combat symbolic execution”, Proc. European Symp. Research Computer Security, 2011, 210–226
[3] Seto T., Monden A., Yucel Z., Kanzaki Y., “On preventing symbolic execution attacks by low cost obfuscation”, 20th IEEE/ACIS Intern. Conf. Software Eng., Artif. Intelligence, Networking and Parallel/Distributed Comput. (SNPD), 2019, 495–500
[4] Lebedev R. K., “Avtomaticheskaya generatsiya khesh-funktsii dlya obfuskatsii programmnogo koda”, Prikladnaya diskretnaya matematika, 2020, no. 50, 102–117 | Zbl
[5] Intel XED, , 2019 https://intelxed.github.io/
[6] Intel\circledR Advanced Encryption Standard Instructions (AES-NI), , 2012 https://software.intel.com/content/www/us/en/develop/articles/intel-advanced-encryption-standard-instructions-aes-ni.html
[7] Lattner C., Adve V., “LLVM: A compilation framework for lifelong program analysis transformation”, Intern. Symp. Code Generation and Optimization, 2004, 75–86
[8] IDA Pro, , 2021 https://www.hex-rays.com/ida-pro/
[9] Ghidra Software Reverse Engineering Framework, , 2021 https://github.com/NationalSecurityAgency/ghidra
[10] Shoshitaishvili Y., Wang R., Salls C., et al., “SOK: (State of) The art of war: Offensive techniques in binary analysis”, IEEE Symp. Security Privacy, 2016, 138–157