참고문헌
- Nagra, Jasvir, and Christian Collberg. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Pearson Education, 2009.
- Barak, Boaz, et al. "On the (im) possibility of obfuscating programs." Annual International Cryptology Conference. Springer, Berlin, Heidelberg, 2001.
- Appel, Andrew. "Deobfuscation is in NP." Princeton University, Aug 21 (2002)
- Anckaert, Bertrand, et al. "Program obfuscation: a quantitative approach." Proceedings of the 2007 ACM workshop on Quality of protection. ACM, 2007.
- Ceccato, Mariano, et al. "The effectiveness of source code obfuscation: An experimental assessment." Program Comprehension, 2009. ICPC'09. IEEE 17th International Conference on. IEEE, 2009.
- Collberg, Christian S., and Clark Thomborson. "Watermarking, tamper-proofing, and obfuscation-tools for software protection." IEEE Transactions on software engineering 28.8 (2002): 735-746. https://doi.org/10.1109/TSE.2002.1027797
- Yadegari, Babak, and Saumya Debray. "Symbolic execution of obfuscated code." Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 2015.
- Banescu, Sebastian, et al. "Code obfuscation against symbolic execution attacks." Proceedings of the 32nd Annual Conference on Computer Security Applications. ACM, 2016.
- Junod, Pascal, et al. "Obfuscator-LLVM--software protection for the masses." Software Protection (SPRO), 2015 IEEE/ACM 1st International Workshop on. IEEE, 2015.
- Collberg, Christian, Clark Thomborson, and Douglas Low. A taxonomy of obfuscating transformations. Department of Computer Science, The University of Auckland, New Zealand, 1997.
- Collberg, Christian, Clark Thomborson, and Douglas Low. "Manufacturing cheap, resilient, and stealthy opaque constructs." Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages. ACM, 1998.
- Robin David & Sebastien Bardin. "Code Deobfuscation: Intertwining Dynamic, Static and Symbolic Approaches." Black Hat Europe, 2016.
- Obfuscator-LLVM. https://github.com/obfuscator-llvm/obfuscator/wiki
- Themida. https://www.oreans.com/themida.php
- VMProtect. http://vmpsoft.com
- Chow, Stanley, et al. "An approach to the obfuscation of control-flow of sequential computer programs." International Conference on Information Security. Springer, Berlin, Heidelberg, 2001.
- Ming, Jiang, et al. "Loop: Logic-oriented opaque predicate detection in obfuscated binary code." Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 2015.
- Collberg, Christian, G. R. Myles, and Andrew Huntwork. "Sandmark-a tool for software protection research." IEEE security & privacy 99.4 (2003): 40-49.
- Z3Prover/z3. https://github.com/Z3Prover/z3
- Linn, Cullen, and Saumya Debray. "Obfuscation of executable code to improve resistance to static disassembly." Proceedings of the 10th ACM conference on Computer and communications security. ACM, 2003.
- Madou, Matias, et al. "Software protection through dynamic code mutation." International Workshop on Information Security Applications. Springer, Berlin, Heidelberg, 2005.
- Kang, Min Gyung, Pongsin Poosankam, and Heng Yin. "Renovo: A hidden code extractor for packed executables." Proceedings of the 2007 ACM workshop on Recurring malcode. ACM, 2007.
- Oberheide, Jon, Michael Bailey, and Farnam Jahanian. "PolyPack: an automated online packing service for optimal antivirus evasion." Proceedings of the 3rd USENIX conference on Offensive technologies. USENIX Association, 2009.
- ScyllaHide. https://bitbucket.org/NtQuery/scyllahide
- StrongOD. https://tuts4you.com/e107_plugins/download/download.php?view.2028
- Ke Sun and Xiaoning Li. "Break out of the Truman show: Active detection and escape of dynamic binary instrumentation". Black Hat Asia 2016.
- Bardin, Sébastien, Robin David, and Jean-Yves Marion. "Backward-Bounded DSE: Targeting Infeasibility Questions on Obfuscated Codes." Security and Privacy (SP), 2017 IEEE Symposium on. IEEE, 2017.
- Rolles, Rolf. "Unpacking virtualization obfuscators." 3rd USENIX Workshop on Offensive Technologies. (WOOT). 2009.
- Kalysch, Anatoli, Johannes Gotzfried, and Tilo Muller. "VMAttack: Deobfuscating Virtualization-Based Packed Binaries." Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, 2017.
- Coogan, Kevin, Gen Lu, and Saumya Debray. "Deobfuscation of virtualization-obfuscated software: a semantics-based approach." Proceedings of the 18th ACM conference on Computer and communications security. ACM, 2011.
- Aschermann, Tim Blazytko Moritz Contag Cornelius, and Thorsten Holz. "Syntia: Synthesizing the Semantics of Obfuscated Code." (2017).