Christian Collberg, ISSUES IN EVALUATION OF REVERSE ENGINEERING AND SOFTWARE PROTECTION [Keynote address, ARES-25], 2025.
Christian Collberg, ISSUES IN EVALUATION OF REVERSE ENGINEERING AND SOFTWARE PROTECTION [Keynote address, ARES-25], 2025.
Tab (Tianyi) Zhang, Claire Taylor, Bart Coppens, Waleed Mebane, Christian Collberg, Bjorn De Sutter, reAnalyst: Scalable annotation of reverse engineering activities, 2025.
Benjamin Mariano, Ziteng Wang, Shankara Pailoor, Christian Collberg, Işil Dillig, Control-Flow Deobfuscation using Trace-Informed Compositional Program Synthesis, 2024.
Thomas Faingnaert, Tab Zhang, Willem Van Iseghem, Gertjan Everaert, Bart Coppens, Christian Collberg, Bjorn De Sutter, Tools and Models for Software Reverse Engineering Research, 2024.
Claire Taylor and Christian Collberg, Getting RevEngE: A System for Analyzing Reverse Engineering Behavior [MALCON 2019 Outstanding Paper Award], 2019.
Christian Collberg, Tigress: A Source-to-Source-ish Obfuscation Tool (Keynote address, SSPREW-8, 2018), 2018.
Christian Collberg, Code Obfuscation: Why is This Still a Thing? [Keynote Address, CODASPY 2018], 2018.
Sebastian Banescu, Christian Collberg, Alexander Pretschner, Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning [USENIX Security'17], 2017.
Sebastian Banescu, Christian Collberg, Vijay Ganesh, Zack Newsham, Alexander Pretschner, Obfuscation Against Symbolic Execution Attacks, [Outstanding Paper Award, ACSAC'16], 2016.
Christian Collberg, Engineering Code Obfuscation [Eurocrypt 2016 invited talk], 2016.
Christian Collberg, Sam Martin, Jonathan Myers, Jasvir Nagra, Distributed Application Tamper Detection via Continuous Software Updates [ACSAC '12], 2012.
John Rubin, Svante Hannevind, Measuring the performance overhead of obfuscating code transformations, 2025.
Roxane Cohen, Robin David, Riccardo Mori, Florian Yger & Fabrice Rossi, Experimental Study of Binary Diffing Resilience on Obfuscated Programs, 2025.
Naiqian Zhang; Dongpeng Xu; Jiang Ming; Jun Xu; Qiaoyan Yu, Inspecting Virtual Machine Diversification Inside Virtualization Obfuscation, 2025.
Hyeongchang Jeon; Seoksu Lee; Eun-Sun Cho, An Enhanced Opaque Predicate Detection Method with Synthesis and Recursive Matching, 2025.
Byunggeon Choi, Hongjoo Jin, Dong Hoon Lee & Wonsuk Choi, ChatDEOB: An Effective Deobfuscation Method Based on Large Language Model, 2025.
XUEZIXIANG LI, SHENG YU, HENG YIN, ALMOND: Learning an Assembly Language Model for 0-Shot Code Obfuscation Detection, 2025.
Yan Cao, Zhizhuang Zhou, Yan Zhuang, Advancing Code Obfuscation: Novel Opaque Predicate Techniques to Counter Dynamic Symbolic Execution, 2025.
David Beste, Grégoire Menguy, Hossein Hajipour, Mario Fritz, Antonio Emanuele Cinà, Sébastien Bardin, Thorsten Holz, Thorsten Eisenhofer & Lea Schönherr, Exploring the Potential of LLMs for Code Deobfuscation, 2025.
Ching Y uhui Natalie, Sophie Tung Xuan Ying, Siow Jing Kai, ALFREDO: AGENTIC LLM-BASED FRAMEWORK FOR CODE DEOBFUSCATION, 2025.
Tanapoom Sermchaiwong, Jiasi Shen, Dynamic Graph-based Fingerprinting of In-browser Cryptomining, 2025.
Siliang Qin, Fengrui Yang, Hao Wang, Bolun Zhang, Zeyu Gao, Chao Zhang, Kai Chen, Tady: A Neural Disassembler without Structural Constraint Violations, 2025.
Xiao Li, Jiajia Sun, Yongguang Zhang, Xiaokang Yin, Shengli Liu, Binary Similarity Detection Based on Intermediate Representation Graph Fusion, 2025.
Daniele Canavese, Leonardo Regano, Bjorn De Sutter, and Cataldo Basile, Automatic Selection of Protections to Mitigate Risks Against Software Applications, 2025.
Lambang Akbar Wijayadi, Yuancheng Jiang, Roland H.C. Yap, Zhenkai Liang, Zhuohao Liu, Evaluating Disassembly Errors With Only Binaries, 2025.
Authors: Moses Ike, Keaton Sadoski, Romuald Valme, Burak Sahin, Saman Zonouz, Wenke Lee, Your Control Host Intrusion Left Some Physical Breadcrumbs: Physical Evidence-Guided Post-Mortem Triage of SCADA Attacks, 2025.
Jiyong Uhm, Yujeong Kwon, Hyungjoon Koo, On the Learnability, Robustness, and Adaptability of Deep Learning Models for Obfuscation-applied Code, 2025.
Roxane Cohen, Robin David, Florian Yger & Fabrice Rossi, Identifying Obfuscated Code Through Graph-Based Semantic Analysis of Binary Code, 2025.
Francesco Sattolo, Performance estimation of obfuscated applications with software metrics, 2024.
Hongjoo Jin , Jiwon Lee, Sumin Yang, Kijoong Kim and Dong Hoon Lee, A Framework to Quantify the Quality of Source Code Obfuscation, 2024.
Håkon Harnes , Donn Morrison, Cryptic Bytes: WebAssembly Obfuscation for Evading Cryptojacking Detection, 2024.
Naiqian Zhang, Zheyun Feng & Dongpeng Xu, An In-Depth Analysis of the Code-Reuse Gadgets Introduced by Software Obfuscation, 2024.
Seoksu Lee, Hyeongchang Jeon, Eun-Sun Cho, Simplifying MBA Expression Using E-Graphs, 2024.
HY Kim, DH Lee, CatchFuzz: Reliable active anti-fuzzing techniques against coverage-guided fuzzer, 2024.
Mila Dalla Preda & Michele Ianni, Exploiting number theory for dynamic software watermarking, 2024.
Glory O. Adebayo, Multimodal stylometry: A novel approach for authorship identifification, 2024.
José Miguel Aragón-Jurado; Javier Jareóo; Juan Carlos De la Torre; Patricia Ruiz; Bernabé Dorronsoro, Two-level Software Obfuscation with Cooperative Co-evolutionary Algorithms, 2024.
Sebastian Raubitzek, Sebastian Schrittwieser, Elisabeth Wimmer, Kevin Mallinger, Obfuscation undercover: Unraveling the impact of obfuscation layering on structural code patterns, 2024.
Héctor D. Menéndez & Guillermo Suárez-Tangil, Summary of ObfSec: Measuring the Security of Obfuscations from a Testing Perspective, 2024.
Sebastian Raubitzek, Sebastian Schrittwieser, Caroline Lawitschka, Kevin Mallinger, Andreas Ekelhart and Edgar Weippl, Code Obfuscation Classification Using Singular Value Decomposition on Grayscale Image Representations, 2024.
Z Tian, R He, H Zhao, L Chen, Function-Level Code Obfuscation Detection Through Self-Attention-Guided Multi-Representation Fusion, 2024.
J Royer, F Tronel, Y Vinçont, V Eléonore, Automatic deobfuscation of virtualized binaries with LLVM, 2024.
Zhoukai Wang, Zuoyan Xu, Yaling Zhang, Xin Song, Yichuan Wang, Research on Code Virtualization Methods for Cloud Applications, 2024.
Adrian Van den Broeck, Deobfuscatie van Packers en Self-Modifying Code en Visualisatie van JIT-Gegenereerde Code, 2024.
Tetsuya Kitaoka; Yuichiro Kanzaki; Takashi Ishio; Kazumasa Shimari; Kenichi Matsumoto, Initial Investigation of Behavioral Changes of Obfuscated Programs Caused by Code Optimization, 2024.
김태현, 안유진, 편고운, 이성호 (Kim Tae-hyun, Ahn Yu-jin, Pyeon Go-un, Lee Seong-ho), 난독화된 코드에 대한 거대 언어 모델의 코드 클론 탐지 성능 실험 및 분석 (Experimental and Analysis of Code Clone Detection Performance of Large Language Models for Obfuscated Code), 2024.
Davide Scarr`a, Exploring the Inner Workings of (anti)cheat Tools, 2024.
Aragón Jurado, José MiguelAuthority; Jareño Dorado, JavierAuthority; Torre Macías, Juan Carlos de laAuthority; Ruiz Villalobos, PatriciaAuthority; Dorronsoro Díaz, Bernabé, Ofuscación de Software en dos Niveles usando Algoritmos Cooperativos Coevolutivos, 2024.
Xuangan Xiao, Yizhuo Wang, Yikun Hu∗, and Dawu Gu∗, XVMP: An LLVM-based Code Virtualization Obfuscator, 2023.
A Shroyer, DM Swany, Detecting Standard Library Functions in Obfuscated Code, 2023.
Sebastian Schrittwieser, Elisabeth Wimmer, Kevin Mallinger, Patrick Kochberger, Caroline Lawitschka, Sebastian Raubitzek & Edgar R. Weippl, Modeling Obfuscation Stealth Through Code Complexity, 2023.
Abdullah Qasem,Mourad Debbabi, Bernard Lebel, Marthe Kassouf, Binary Function Clone Search in the Presence of Code Obfuscation and Optimization over Multi-CPU Architectures,, 2023.
C Lawitschka, P König, ER Weippl, Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation, 2023.
Dinu, Daniel, ObfuscatorDynamic-LLVM: Dynamic Symbolic Execution Attack Protections for the Masses, 2023.
Friptu, Petru-Ştefan, Learning white-box: Applying machine learning to identify white-box related functions in binaries, 2023.
Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong, Pierre Wilke, OATs’inside: Retrieving Object Behaviors From Native-based Obfuscated Android Applications, , 2023.
Bin Li; Yufeng Tang; Yupeng Zhang; Hengxing Liu; Di Li; Zheng Gong, Cryptanalysis of Space-Hard Ciphers under Strong White-Box Security, 2023.
Bin Li; Yufeng Tang; Yupeng Zhang; Hengxing Liu; Di Li; Zheng Gong, DEEP LEARNING FOR OBFUSCATED CODE ANALYSIS, Alexander Shroyer, 2023.
Naiqian Zhang; Daroc Alden; Dongpeng Xu; Shuai Wang; Trent Jaeger; Wheeler Ruml, No Free Lunch: On the Increased Code Reuse Attack Surface of Obfuscated Programs, 2023.
Pietro Borrello, Taming Complex Bugs in Secure Systems, 2023.
Huaijin Wang, Pingchuan Ma, Shuai Wang, Qiyi Tang, Sen Nie, Shi Wu, sem2vec: Semantics-aware Assembly Tracelet Embedding, , 2023.
Jianyi Zhang , Zhenkui Li , Yudong Liu , Zezheng Sun ,Zhiqiang Wang, SAFTE: A self-injection based anti-fuzzing technique, 2023.
Cataldo Basile, Bjorn De Sutter, Daniele Canavese a, Leonardo Regano, Bart Coppens, Design, implementation, and automation of a risk management approach for man-at-the-End software protection, 2023.
Visentin, Thomas, Obfuscation complexity optimization, 2022.
F Lopes, Resilience of code obfuscation to optimization and fuzzing, 2022.
I Di Pietro, Overhead prediction in obfuscated programs, 2022.
Michael Pucher, Christian Kudera, Georg Merzdovnik, Detecting Obfuscated Function Clones in Binaries using Machine Learning, 2022.
Shrenik Bhansali, Ahmet Aris, Abbas Acar, Harun Oz, and A. Selcuk Uluagac, A First Look at Code Obfuscation for WebAssembly, 2022.
Deepak Adhikari, J. Todd McDonald, Todd R. Andel, Joseph D. Richardson, Argon: A Toolbase for Evaluating Software Protection Techniques Against Symbolic Execution Attacks, 2022.
Seoyeon Kang, Jeongwoo Kim, Eun-Sun Cho, Seokwoo Choi, Program Synthesis-based Simplification of MBA Obfuscated Malware with Restart Strategies, 2022.
A. Shroyer and D. M. Swany, Data Augmentation for Code Analysis, 2022.
K Tang, Z Shan, C Zhang, L Xu, M Qiao, F Liu, DFSGraph: Data Flow Semantic Model for Intermediate Representation Programs Based on Graph Network, 2022.
Claire Taylor, Remotely Observing Reverse Engineers to Evaluate Software Protection, 2022.
Micha Horlboge, Erwin Quiring, Roland Meyer, Konrad Rieck, I still know it’s you! On Challenges in Anonymizing Source Code, 2022.
Farzaneh Abazari, Enrico Branca, Evgeniya Novikova & Natalia Stakhanova, Language and Platform Independent Attribution of Heterogeneous Code, 2022.
Zhenzhou Tian, Hengchao Mao, Yaqian Huang, Jie Tian & Jinrui Li, Fine-Grained Obfuscation Scheme Recognition on Binary Code, 2022.
Seong-Kyun Mok, Seoyeon Kang, Jeongwoo Kim, Eun-Sun Cho, Seokwoo Choi, SSLEM: A Simplifier for MBA Expressions based on Semi-linear MBA Expressions and Program Synthesis, 2022.
Guillaume Barbu, Ward Beullens, Emmanuelle Dottax, Christophe Giraud, Agathe Houzelot, Chaoyun Li, Mohammad Mahzoun, Adrián Ranea, and Jianrui Xie, ECDSA White-Box Implementations: Attacks and Designs from WhibOx 2021 Contest, 2022.
Viraj Kumar, Privately Executable Examples, 2022.
B Liu, Q Zheng, J Li, D Xu, An In‐Place Simplification on Mixed Boolean‐Arithmetic Expressions, 2022.
A Kurtukova, A Romanov, A Shelupanov, A Fedotova, Complex cases of source code authorship identification using a hybrid deep neural network, 2022.
S Alrabaee, M Debbabi, L Wang, A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features, 2022.
А.В. Куртукова, А.С. Романов, А.А. Шелупанов, А.М. Федотова, Идентификация автора исходного кода программы на основе неоднородных данных для решения задач кибербезопасности, 2022.
Войцеховський, Андрiй Валерiйович, Моделi i методи протидi класифiкаторам шкiдливого програмного забезпечення на основi машинного навчання, 2022.
Yujie Zhao, Zhanyong Tang, Guixin Ye, Xiaoqing Gong, Dingyi Fang, Input‐Output Example‐Guided Data Deobfuscation on Binary, 2021.
Colby B. Parker, J. Todd McDonald and Dimitrios Damopoulos, Machine Learning Classification of Obfuscation using Image Visualization, 2021.
Patrick Kochberger, Sebastian Schrittwieser, Stefan Schweighofer, Peter Kieseberg, Edgar Weippl, Automatic Deobfuscation of Virtualization-protected Applications, 2021.
Anjali J Suresh; Sriram Sankaran, Power Profiling and Analysis of Code Obfuscation for Embedded Devices, 2020.
MT Shiraz, Analysis of obfuscation transformations on binary code, 2019.
MT Shiraz, Ramtine Tofighi-Shirazi, Irina Măriuca Asăvoae, Philippe Elbaz, 2019.
MT Shiraz, SATURN - Software Deobfuscation Framework Based On LLVM, 2019.
Coniglio, Luigi, Combining program synthesis and symbolic execution to deobfuscate binary code, 2019.
Regano, Leonardo, An Expert System for Automatic Software Protection, 2019.
Emre Güler, Cornelius Aschermann, Ali Abbasi, and Thorsten Holz, ANTIFUZZ: Impeding Fuzzing Audits of Binary Executables, 2019.
Mathilde Ollivier, Sebastien Bardin, Richard Bonichon, and Jean-Yves Marion, How to Kill Symbolic Deobfuscation for Free (or: Unleashing the Potential of Path-Oriented Protections), 2019.
Ramtine Tofighi-Shirazi, Irina Asăvoae, Philippe Elbaz-Vincent, Thanh-Ha Le, Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis, 2019.
Mahin Talukder, Syed Islam, Paolo Falcarin, Analysis of Obfuscated Code with Program Slicing, 2019.
Steven H. H. Ding, Benjamin C. M. Fung, and Philippe Charland, Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization, 2019.
Jonathan Salwan, Sébastien Bardin, Marie-Laure Potet, Symbolic Deobfuscation: From Virtualized Code Back to the Original, 2019.
Sandrine Blazy, Rémi Hutin, Formal verification of a program obfuscation based on mixed Boolean-arithmetic expressions, 2019.
Anatoli Kalysch, Oskar Milisterfer, Mykolai Protsenko, Tilo Muller, Tackling Androids Native Library Malware with Robust, Efficient and Accurate Similarity Measures, 2018.
A. Salem, GoldRusher:, A miner for rapid identification of hidden code, 2018.
Serge Guelton; Adrien Guinet; Pierrick Brunet; Juan Manuel Martinez; Fabien Dagnat; Nicolas Szlifierski, Combining Obfuscation and Optimizations in the Real World, 2018.
Ramtine Tofighi-Shirazi, Maria Christofi, Philippe Elbaz-Vincent, Thanh-Ha Le, DoSE: Deobfuscation based on Semantic Equivalence, 2018.
Fabrizio Biondi, Thomas Given-Wilson, Axel Legay, Cassius Puodziusm, Jean Quilbeuf, Tutorial: An Overview of Malware Detection and Evasion Techniques, 2018.
Niccolò Marastoni, Roberto Giacobazzi, Roberto Giacobazzi, Mila Dalla Preda, A Deep Learning Approach to Program Similarity, 2018.
William D. Holder, EVALUATING OPTIMAL PHASE ORDERING IN OBFUSCATION EXECUTIVES, 2017.
Mark Janssen,, Combining learning with fuzzing for software deobfuscation, 2016.
Pierre Graux, Désobscurcissement de programmes virtualisés, 2016.
Tsong Yueh Chen, Fei-Ching Kuo, Wenjuan Ma, Willy Susilo, Dave Towey, Jeffrey Voas, and Zhi Quan Zhou, Metamorphic Testing for Cybersecurity, 2016.
Robin David, Sebastien Bardin, Jean-Yves Marion,, Targeting Infeasibility Questions on Obfuscated Codes to study the effectiveness of Dynamic Symbolic Execution, 2016.
Harshvardhan P. Joshi, Aravindhan Dhanasekaran and Rudra Dutta, Trading Off a Vulnerability: Does Software Obfuscation Increase the Risk of ROP, 2015.
Federico Scrinzi, Behavioral Analysis of Obfuscated Code, 2015.
Sebastian Banescu, Mart´ ın Ochoa and Alexander Pretschner, A Framework for Measuring Software Obfuscation Resilience Against Automated Attacks, 2015.
Johannes Kinder, Towards Static Analysis of Virtualization-Obfuscated Binaries, WCRE'12, 2012.