Christian Collberg, Engineering Code Obfuscation, Eurocrypt 2016 invited talk. Slides are here. The talk itself is here.
Sebastian Banescu, Christian Collberg, Alexander Pretschner, Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning, USENIX Security'17. [PDF]
Jon Stephens, Babak Yadegari, Christian Collberg, Saumya Debray, and Carlos Scheidegger, Probabilistic Obfuscation through Covert Channels, 3rd IEEE European Symposium on Security and Privacy, 2018. [PDF]
Sebastian Banescu, Christian Collberg, Vijay Ganesh, Zack Newsham, Alexander Pretschner, Obfuscation Against Symbolic Execution Attacks, Outstanding Paper Award at ACSAC'16. [PDF]
Yuichiro Kanzaki, Akito Monden, Christian Collberg, Code Artificiality: A Metric for the Code Stealth Based on an N-gram Model, 2015 IEEE/ACM 1st International Workshop on Software Protection, [PDF]
Yuichiro Kanzaki, Clark Thomborson, Akito Monden, Christian S Collberg, Pinpointing and hiding surprising fragments in an obfuscated program, 5th Program Protection and Reverse Engineering Workshop, PPREW 2015. [PDF]
Christian Collberg, Sam Martin, Jonathan Myers, Jasvir Nagra, Distributed Application Tamper Detection via Continuous Software Updates, ACSAC '12, [PDF]
Publications by other groups. Below are publications by other groups where they used Tigress as a part of their research, sometimes to attack Tigress-generated code, sometimes to compare Tigress against their own obfuscators:
Ramtine Tofighi-Shirazi, Maria Christofi, Philippe Elbaz-Vincent, Thanh-Ha Le. DoSE: Deobfuscation based on Semantic Equivalence. [PDF]
Ramtine Tofighi-Shirazi, Irina Măriuca Asăvoae, Philippe Elbaz, Fine-grained static detection of obfuscation transforms using ensemble-learning and semantic reasoning. [PDF]
Peter Garba, Matteo Favaro, SATURN - Software Deobfuscation Framework Based On LLVM. [PDF]
Coniglio, Luigi, Combining program synthesis and symbolic execution to deobfuscate binary code. [PDF]
Regano, Leonardo, An Expert System for Automatic Software Protection. [PDF]
Peter Garba, Matteo Favaro, SATURN - Software Deobfuscation Framework Based on LLVM. [PDF]
Fabrizio Biondi, Thomas Given-Wilson, Axel Legay, Cassius Puodziusm, Jean Quilbeuf, Tutorial: An Overview of Malware Detection and Evasion Techniques. [PDF]
Niccolò Marastoni, Roberto Giacobazzi, Roberto Giacobazzi, Mila Dalla Preda, A Deep Learning Approach to Program Similarity. [PDF]
Emre Güler, Cornelius Aschermann, Ali Abbasi, and Thorsten Holz, ANTIFUZZ: Impeding Fuzzing Audits of Binary Executables. [PDF]
Mathilde Ollivier, Sebastien Bardin, Richard Bonichon, and Jean-Yves Marion, How to Kill Symbolic Deobfuscation for Free (or: Unleashing the Potential of Path-Oriented Protections). [PDF]
Ramtine Tofighi-Shirazi, Irina Asăvoae, Philippe Elbaz-Vincent, Thanh-Ha Le, Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis. [PDF]
Mahin Talukder, Syed Islam, Paolo Falcarin, Analysis of Obfuscated Code with Program Slicing. [PDF]
Steven H. H. Ding, Benjamin C. M. Fung, and Philippe Charland, Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization. [PDF]
Jonathan Salwan, Sébastien Bardin, Marie-Laure Potet, Symbolic Deobfuscation: From Virtualized Code Back to the Original. [PDF]
Sandrine Blazy, Rémi Hutin, Formal verification of a program obfuscation based on mixed Boolean-arithmetic expressions. [PDF]
Federico Scrinzi, Behavioral Analysis of Obfuscated Code. [PDF]
Mark Janssen, Combining learning with fuzzing for software deobfuscation. [PDF]
Johannes Kinder, Towards Static Analysis of Virtualization-Obfuscated Binaries, WCRE'12. [PDF]
Harshvardhan P. Joshi, Aravindhan Dhanasekaran and Rudra Dutta, Trading Off a Vulnerability: Does Software Obfuscation Increase the Risk of ROP. [PDF]
Pierre Graux, Désobscurcissement de programmes virtualisés. [PDF]
Tsong Yueh Chen, Fei-Ching Kuo, Wenjuan Ma, Willy Susilo, Dave Towey, Jeffrey Voas, and Zhi Quan Zhou, Metamorphic Testing for Cybersecurity. [PDF]
Robin David, Sebastien Bardin, Jean-Yves Marion,Targeting Infeasibility Questions on Obfuscated Codes to study the effectiveness of Dynamic Symbolic Execution. [PDF]
William D. Holder,, EVALUATING OPTIMAL PHASE ORDERING IN OBFUSCATION EXECUTIVES. [PDF]
Thomas Rinsma, Seeing through obfuscation: interactive detection and removal of opaque predicates, attacks Tigress' opaque predicates. [PDF]
Anatoli Kalysch, Oskar Milisterfer, Mykolai Protsenko, Tilo Muller, Tackling Androids Native Library Malware with Robust, Efficient and Accurate Similarity Measures. [PDF]
A. Salem, GoldRusher: A miner for rapid identification of hidden code. [PDF]