[1] |
VITICCHIé A , REGANO L , TORCHIANO M ,et al. Assessment of source code obfuscation techniques[C]// 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (SCAM). 2016: 11-20.
|
[2] |
POPOV I V , DEBRAY S K , ANDREWS G R . Binary obfuscation using signals[C]// USENIX Security Symposium. 2007: 275-290.
|
[3] |
SCHRITTWIESER S , KATZENBEISSER S , KIESEBERG P ,et al. Covert computation:hiding code in code for obfuscation purposes[C]// The 8th ACM SIGSAC Symposium on Information,Computer and Communications Security. 2013: 529-534.
|
[4] |
AVIDAN E , FEITELSON D G . From obfuscation to comprehension[C]// 2015 IEEE 23rd International Conference on Program Comprehension. 2015: 178-181.
|
[5] |
BALACHANDRAN V , KEONG N W , EMMANUEL S . Function level control flow obfuscation for software security[C]// 2014 Eighth International Conference on Complex,Intelligent and Software Intensive Systems (CISIS). 2014: 133-140.
|
[6] |
BALACHANDRAN V , EMMANUEL S . Potent and stealthy control flow obfuscation by stack based self-modifying code[J]. IEEE Transactions on Information Forensics and Security, 2013,8(4): 669-681.
|
[7] |
BALACHANDRAN V , EMMANUEL S . Software protection with obfuscation and encryption[C]// International Conference on Information Security Practice and Experience. 2013: 309-320.
|
[8] |
BRUNI R , GIACOBAZZI R , GORI R . Code obfuscation against abstract model checking attacks[C]// International Conference on Verification,Model Checking,and Abstract Interpretation. 2018: 94-115.
|
[9] |
CIMITILE A , MARTINELLI F , MERCALDO F ,et al. Formal methods meet mobile code obfuscation identification of code reordering technique[C]// 2017 IEEE 26th International Conference on Enabling Technologies:Infrastructure for Collaborative Enterprises(WETICE). 2017: 263-268.
|
[10] |
BRUMLEY D , JAGER I , AVGERINOS T ,et al. BAP:a binary analysis platform[C]// International Conference on Computer Aided Verification. 2011: 463-469.
|
[11] |
KING J C . Symbolic execution and program testing[J]. Communications of the ACM, 1976,19(7): 385-394.
|
[12] |
BANESCU S , COLLBERG C , GANESH V ,et al. Code obfuscation against symbolic execution attacks[C]// The 32nd Annual Conference on Computer Security Applications. 2016: 189-200.
|
[13] |
贾春福, 王志, 刘昕 ,等. 路径模糊:一种有效抵抗符号执行的二进制混淆技术[J]. 计算机研究与发展, 2011,48(11): 2111-2119.
|
|
JIA C F , WANG Z , LIU X ,et al. Branch obfuscation:an efficient binary code obfuscation impede symbolic execution[J]. Journal of Computer Research and Development, 2011,48(11): 2111-2119.
|
[14] |
王志, 贾春福, 刘伟杰 ,等. 一种抵抗符号执行的路径分支混淆技术[J]. 电子学报, 2015,43(5): 870-878.
|
|
WANG Z , JIA C F , LIU W J ,et al. Branch obfuscation to combat symbolic execution[J]. Acta Electronica Sinica, 2015,43(5): 870-878.
|
[15] |
BANESCU S , COLLBERG C , GANESH V ,et al. Code obfuscation against symbolic execution attacks[C]// The 32nd Annual Conference on Computer Security Applications. 2016: 189-200.
|
[16] |
BANESCU S , COLLBERG C , PRETSCHNER A . Predicting the resilience of obfuscated code against symbolic execution attacks via machine learning[C]// The 26th USENIX Security Symposium. 2017.
|
[17] |
LIN H , ZHANG X , YONG M ,et al. Branch obfuscation using binary code side effects[C]// International Conference on Computer,Networks and Communication Engineering (ICCNCE 2013). 2013.
|
[18] |
陈喆, 贾春福, 宗楠 ,等. 随机森林在程序分支混淆中的应用[J]. 电子学报, 2018,46(10): 2458-2466.
|
|
CHEN Z , JIA C F , ZONG N ,et al. Branch obfuscation using random Forest[J]. Acta Electronica Sinica, 2018,46(10): 2458-2466.
|