web templates free download
  • Claire Taylor and Christian Collberg, Getting RevEngE: A System for Analyzing Reverse Engineering Behavior, Outstanding Paper Award, MALCON 2019.
  • Christian Collberg, Keynote address, Tigress: A Source-to-Source-ish Obfuscation Tool, SSPREW-8, 2018.
  • Christian Collberg, Engineering Code Obfuscation, Eurocrypt 2016 invited talk. Slides are here. The talk itself is here.
  • Sebastian Banescu, Christian Collberg, Alexander Pretschner, Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning, USENIX Security'17. [PDF]
  • Christian Collberg, Invited Essayist Keynote: Dare to Share: Risks and Rewards of Artifact Sharing in Computer Science (Not related to Tigress, but cool never-the-less!), 2017.
  • Christian Collberg, Keynote Address, Code Obfuscation: Why is This Still a Thing? CODASPY 2018, [PDF]
  • Jon Stephens, Babak Yadegari, Christian Collberg, Saumya Debray, and Carlos Scheidegger, Probabilistic Obfuscation through Covert Channels, 3rd IEEE European Symposium on Security and Privacy, 2018. [PDF]
  • Sebastian Banescu, Christian Collberg, Vijay Ganesh, Zack Newsham, Alexander Pretschner, Obfuscation Against Symbolic Execution Attacks, Outstanding Paper Award at ACSAC'16. [PDF]
  • Yuichiro Kanzaki, Akito Monden, Christian Collberg, Code Artificiality: A Metric for the Code Stealth Based on an N-gram Model, 2015 IEEE/ACM 1st International Workshop on Software Protection, [PDF]
  • Yuichiro Kanzaki, Clark Thomborson, Akito Monden, Christian S Collberg, Pinpointing and hiding surprising fragments in an obfuscated program, 5th Program Protection and Reverse Engineering Workshop, PPREW 2015. [PDF]
  • Christian Collberg, Sam Martin, Jonathan Myers, Jasvir Nagra, Distributed Application Tamper Detection via Continuous Software Updates, ACSAC '12, [PDF]

Publications by other groups. Below are publications by other groups where they used Tigress as a part of their research, sometimes to attack Tigress-generated code, sometimes to compare Tigress against their own obfuscators:


  •  Ramtine Tofighi-Shirazi, Maria Christofi, Philippe Elbaz-Vincent, Thanh-Ha Le. DoSE: Deobfuscation based on Semantic Equivalence. [PDF]
  • Ramtine Tofighi-Shirazi, Irina Măriuca Asăvoae, Philippe Elbaz, Fine-grained static detection of obfuscation transforms using ensemble-learning and semantic reasoning. [PDF]
  • Peter Garba, Matteo Favaro, SATURN - Software Deobfuscation Framework Based On LLVM. [PDF]
  • Coniglio, Luigi, Combining program synthesis and symbolic execution to deobfuscate binary code. [PDF]
  • Regano, Leonardo, An Expert System for Automatic Software Protection. [PDF]
  • Peter Garba, Matteo Favaro, SATURN - Software Deobfuscation Framework Based on LLVM. [PDF]
  • Fabrizio Biondi, Thomas Given-Wilson, Axel Legay, Cassius Puodziusm, Jean Quilbeuf, Tutorial: An Overview of Malware Detection and Evasion Techniques. [PDF]
  • Niccolò Marastoni, Roberto Giacobazzi, Roberto Giacobazzi, Mila Dalla Preda, A Deep Learning Approach to Program Similarity. [PDF]
  • Emre Güler, Cornelius Aschermann, Ali Abbasi, and Thorsten Holz, ANTIFUZZ: Impeding Fuzzing Audits of Binary Executables. [PDF]
  • Mathilde Ollivier, Sebastien Bardin, Richard Bonichon, and Jean-Yves Marion, How to Kill Symbolic Deobfuscation for Free (or: Unleashing the Potential of Path-Oriented Protections). [PDF]
  • Ramtine Tofighi-Shirazi, Irina Asăvoae, Philippe Elbaz-Vincent, Thanh-Ha Le, Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis. [PDF]
  • Mahin Talukder, Syed Islam, Paolo Falcarin, Analysis of Obfuscated Code with Program Slicing. [PDF]
  • Steven H. H. Ding, Benjamin C. M. Fung, and Philippe Charland, Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization. [PDF]
  • Jonathan Salwan, Sébastien Bardin, Marie-Laure Potet, Symbolic Deobfuscation: From Virtualized Code Back to the Original. [PDF]
  • Sandrine Blazy, Rémi Hutin, Formal verification of a program obfuscation based on mixed Boolean-arithmetic expressions. [PDF]
  • Federico Scrinzi, Behavioral Analysis of Obfuscated Code. [PDF]
  • Mark Janssen, Combining learning with fuzzing for software deobfuscation. [PDF]
  • Johannes Kinder, Towards Static Analysis of Virtualization-Obfuscated Binaries, WCRE'12. [PDF]
  • Harshvardhan P. Joshi, Aravindhan Dhanasekaran and Rudra Dutta, Trading Off a Vulnerability: Does Software Obfuscation Increase the Risk of ROP. [PDF]
  • Pierre Graux, Désobscurcissement de programmes virtualisés. [PDF]
  • Tsong Yueh Chen, Fei-Ching Kuo, Wenjuan Ma, Willy Susilo, Dave Towey, Jeffrey Voas, and Zhi Quan Zhou, Metamorphic Testing for Cybersecurity. [PDF]
  • Robin David, Sebastien Bardin, Jean-Yves Marion,Targeting Infeasibility Questions on Obfuscated Codes to study the effectiveness of Dynamic Symbolic Execution. [PDF]
  • William D. Holder,, EVALUATING OPTIMAL PHASE ORDERING IN OBFUSCATION EXECUTIVES. [PDF]
  • Thomas Rinsma, Seeing through obfuscation: interactive detection and removal of opaque predicates, attacks Tigress' opaque predicates. [PDF]
  • Anatoli Kalysch, Oskar Milisterfer, Mykolai Protsenko, Tilo Muller, Tackling Androids Native Library Malware with Robust, Efficient and Accurate Similarity Measures. [PDF]
  • A. Salem, GoldRusher: A miner for rapid identification of hidden code. [PDF]