Publications by our group

2

Tab (Tianyi) Zhang, Claire Taylor, Bart Coppens, Waleed Mebane, Christian Collberg, Bjorn De Sutter, reAnalyst: Scalable annotation of reverse engineering activities, 2025.

3

Benjamin Mariano, Ziteng Wang, Shankara Pailoor, Christian Collberg, Işil Dillig, Control-Flow Deobfuscation using Trace-Informed Compositional Program Synthesis, 2024.

4

Thomas Faingnaert, Tab Zhang, Willem Van Iseghem, Gertjan Everaert, Bart Coppens, Christian Collberg, Bjorn De Sutter, Tools and Models for Software Reverse Engineering Research, 2024.

11

Sebastian Banescu, Christian Collberg, Vijay Ganesh, Zack Newsham, Alexander Pretschner, Obfuscation Against Symbolic Execution Attacks, [Outstanding Paper Award, ACSAC'16], 2016.

15

Christian Collberg, Sam Martin, Jonathan Myers, Jasvir Nagra, Distributed Application Tamper Detection via Continuous Software Updates [ACSAC '12], 2012.


2025 publications that use Tigress

2

Roxane Cohen, Robin David, Riccardo Mori, Florian Yger & Fabrice Rossi, Experimental Study of Binary Diffing Resilience on Obfuscated Programs, 2025.

3

Naiqian Zhang; Dongpeng Xu; Jiang Ming; Jun Xu; Qiaoyan Yu, Inspecting Virtual Machine Diversification Inside Virtualization Obfuscation, 2025.

5

Byunggeon Choi, Hongjoo Jin, Dong Hoon Lee & Wonsuk Choi, ChatDEOB: An Effective Deobfuscation Method Based on Large Language Model, 2025.

8

David Beste, Grégoire Menguy, Hossein Hajipour, Mario Fritz, Antonio Emanuele Cinà, Sébastien Bardin, Thorsten Holz, Thorsten Eisenhofer & Lea Schönherr, Exploring the Potential of LLMs for Code Deobfuscation, 2025.

9

Ching Y uhui Natalie, Sophie Tung Xuan Ying, Siow Jing Kai, ALFREDO: AGENTIC LLM-BASED FRAMEWORK FOR CODE DEOBFUSCATION, 2025.

10

Tanapoom Sermchaiwong, Jiasi Shen, Dynamic Graph-based Fingerprinting of In-browser Cryptomining, 2025.

11

Siliang Qin, Fengrui Yang, Hao Wang, Bolun Zhang, Zeyu Gao, Chao Zhang, Kai Chen, Tady: A Neural Disassembler without Structural Constraint Violations, 2025.

12

Xiao Li, Jiajia Sun, Yongguang Zhang, Xiaokang Yin, Shengli Liu, Binary Similarity Detection Based on Intermediate Representation Graph Fusion, 2025.

13

Daniele Canavese, Leonardo Regano, Bjorn De Sutter, and Cataldo Basile, Automatic Selection of Protections to Mitigate Risks Against Software Applications, 2025.

14

Lambang Akbar Wijayadi, Yuancheng Jiang, Roland H.C. Yap, Zhenkai Liang, Zhuohao Liu, Evaluating Disassembly Errors With Only Binaries, 2025.

15

Authors: Moses Ike, Keaton Sadoski, Romuald Valme, Burak Sahin, Saman Zonouz, Wenke Lee, Your Control Host Intrusion Left Some Physical Breadcrumbs: Physical Evidence-Guided Post-Mortem Triage of SCADA Attacks, 2025.

17

Roxane Cohen, Robin David, Florian Yger & Fabrice Rossi, Identifying Obfuscated Code Through Graph-Based Semantic Analysis of Binary Code, 2025.


2024 publications that use Tigress

2

Hongjoo Jin , Jiwon Lee, Sumin Yang, Kijoong Kim and Dong Hoon Lee, A Framework to Quantify the Quality of Source Code Obfuscation, 2024.

5

Seoksu Lee, Hyeongchang Jeon, Eun-Sun Cho, Simplifying MBA Expression Using E-Graphs, 2024.

7

Mila Dalla Preda & Michele Ianni, Exploiting number theory for dynamic software watermarking, 2024.

9

José Miguel Aragón-Jurado; Javier Jareóo; Juan Carlos De la Torre; Patricia Ruiz; Bernabé Dorronsoro, Two-level Software Obfuscation with Cooperative Co-evolutionary Algorithms, 2024.

10

Sebastian Raubitzek, Sebastian Schrittwieser, Elisabeth Wimmer, Kevin Mallinger, Obfuscation undercover: Unraveling the impact of obfuscation layering on structural code patterns, 2024.

11

Héctor D. Menéndez & Guillermo Suárez-Tangil, Summary of ObfSec: Measuring the Security of Obfuscations from a Testing Perspective, 2024.

12

Sebastian Raubitzek, Sebastian Schrittwieser, Caroline Lawitschka, Kevin Mallinger, Andreas Ekelhart and Edgar Weippl, Code Obfuscation Classification Using Singular Value Decomposition on Grayscale Image Representations, 2024.

14

J Royer, F Tronel, Y Vinçont, V Eléonore, Automatic deobfuscation of virtualized binaries with LLVM, 2024.

16

Zhoukai Wang, Zuoyan Xu, Yaling Zhang, Xin Song, Yichuan Wang, Research on Code Virtualization Methods for Cloud Applications, 2024.

18

Tetsuya Kitaoka; Yuichiro Kanzaki; Takashi Ishio; Kazumasa Shimari; Kenichi Matsumoto, Initial Investigation of Behavioral Changes of Obfuscated Programs Caused by Code Optimization, 2024.

21

Aragón Jurado, José MiguelAuthority; Jareño Dorado, JavierAuthority; Torre Macías, Juan Carlos de laAuthority; Ruiz Villalobos, PatriciaAuthority; Dorronsoro Díaz, Bernabé, Ofuscación de Software en dos Niveles usando Algoritmos Cooperativos Coevolutivos, 2024.


2023 publications that use Tigress

1

Xuangan Xiao, Yizhuo Wang, Yikun Hu∗, and Dawu Gu∗, XVMP: An LLVM-based Code Virtualization Obfuscator, 2023.

3

Sebastian Schrittwieser, Elisabeth Wimmer, Kevin Mallinger, Patrick Kochberger, Caroline Lawitschka, Sebastian Raubitzek & Edgar R. Weippl, Modeling Obfuscation Stealth Through Code Complexity, 2023.

5

10

Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong, Pierre Wilke, OATs’inside: Retrieving Object Behaviors From Native-based Obfuscated Android Applications, , 2023.

11

Bin Li; Yufeng Tang; Yupeng Zhang; Hengxing Liu; Di Li; Zheng Gong, Cryptanalysis of Space-Hard Ciphers under Strong White-Box Security, 2023.

12

Bin Li; Yufeng Tang; Yupeng Zhang; Hengxing Liu; Di Li; Zheng Gong, DEEP LEARNING FOR OBFUSCATED CODE ANALYSIS, Alexander Shroyer, 2023.

13

Naiqian Zhang; Daroc Alden; Dongpeng Xu; Shuai Wang; Trent Jaeger; Wheeler Ruml, No Free Lunch: On the Increased Code Reuse Attack Surface of Obfuscated Programs, 2023.

14

15

Huaijin Wang, Pingchuan Ma, Shuai Wang, Qiyi Tang, Sen Nie, Shi Wu, sem2vec: Semantics-aware Assembly Tracelet Embedding, , 2023.

16

Jianyi Zhang , Zhenkui Li , Yudong Liu , Zezheng Sun ,Zhiqiang Wang, SAFTE: A self-injection based anti-fuzzing technique, 2023.

17

Cataldo Basile, Bjorn De Sutter, Daniele Canavese a, Leonardo Regano, Bart Coppens, Design, implementation, and automation of a risk management approach for man-at-the-End software protection, 2023.


2022 publications that use Tigress

1

Visentin, Thomas, Obfuscation complexity optimization, 2022.

4

Michael Pucher, Christian Kudera, Georg Merzdovnik, Detecting Obfuscated Function Clones in Binaries using Machine Learning, 2022.

5

Shrenik Bhansali, Ahmet Aris, Abbas Acar, Harun Oz, and A. Selcuk Uluagac, A First Look at Code Obfuscation for WebAssembly, 2022.

6

Deepak Adhikari, J. Todd McDonald, Todd R. Andel, Joseph D. Richardson, Argon: A Toolbase for Evaluating Software Protection Techniques Against Symbolic Execution Attacks, 2022.

7

Seoyeon Kang, Jeongwoo Kim, Eun-Sun Cho, Seokwoo Choi, Program Synthesis-based Simplification of MBA Obfuscated Malware with Restart Strategies, 2022.

8

A. Shroyer and D. M. Swany, Data Augmentation for Code Analysis, 2022.

11

Micha Horlboge, Erwin Quiring, Roland Meyer, Konrad Rieck, I still know it’s you! On Challenges in Anonymizing Source Code, 2022.

12

Farzaneh Abazari, Enrico Branca, Evgeniya Novikova & Natalia Stakhanova, Language and Platform Independent Attribution of Heterogeneous Code, 2022.

13

Zhenzhou Tian, Hengchao Mao, Yaqian Huang, Jie Tian & Jinrui Li, Fine-Grained Obfuscation Scheme Recognition on Binary Code, 2022.

14

Seong-Kyun Mok, Seoyeon Kang, Jeongwoo Kim, Eun-Sun Cho, Seokwoo Choi, SSLEM: A Simplifier for MBA Expressions based on Semi-linear MBA Expressions and Program Synthesis, 2022.

15

Guillaume Barbu, Ward Beullens, Emmanuelle Dottax, Christophe Giraud, Agathe Houzelot, Chaoyun Li, Mohammad Mahzoun, Adrián Ranea, and Jianrui Xie, ECDSA White-Box Implementations: Attacks and Designs from WhibOx 2021 Contest, 2022.

16

Viraj Kumar, Privately Executable Examples, 2022.

18


2021 (non exhaustive) publications that use Tigress

2

Yujie Zhao, Zhanyong Tang, Guixin Ye, Xiaoqing Gong, Dingyi Fang, Input‐Output Example‐Guided Data Deobfuscation on Binary, 2021.

3

Colby B. Parker, J. Todd McDonald and Dimitrios Damopoulos, Machine Learning Classification of Obfuscation using Image Visualization, 2021.

4

Patrick Kochberger, Sebastian Schrittwieser, Stefan Schweighofer, Peter Kieseberg, Edgar Weippl, Automatic Deobfuscation of Virtualization-protected Applications, 2021.


2020 (non exhaustive) publications that use Tigress


2019 (non exhaustive) publications that use Tigress

6

Emre Güler, Cornelius Aschermann, Ali Abbasi, and Thorsten Holz, ANTIFUZZ: Impeding Fuzzing Audits of Binary Executables, 2019.

7

Mathilde Ollivier, Sebastien Bardin, Richard Bonichon, and Jean-Yves Marion, How to Kill Symbolic Deobfuscation for Free (or: Unleashing the Potential of Path-Oriented Protections), 2019.

8

Ramtine Tofighi-Shirazi, Irina Asăvoae, Philippe Elbaz-Vincent, Thanh-Ha Le, Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis, 2019.

9

Mahin Talukder, Syed Islam, Paolo Falcarin, Analysis of Obfuscated Code with Program Slicing, 2019.

11

Jonathan Salwan, Sébastien Bardin, Marie-Laure Potet, Symbolic Deobfuscation: From Virtualized Code Back to the Original, 2019.


2018 (non exhaustive) publications that use Tigress

1

Anatoli Kalysch, Oskar Milisterfer, Mykolai Protsenko, Tilo Muller, Tackling Androids Native Library Malware with Robust, Efficient and Accurate Similarity Measures, 2018.

2

3

Serge Guelton; Adrien Guinet; Pierrick Brunet; Juan Manuel Martinez; Fabien Dagnat; Nicolas Szlifierski, Combining Obfuscation and Optimizations in the Real World, 2018.

4

Ramtine Tofighi-Shirazi, Maria Christofi, Philippe Elbaz-Vincent, Thanh-Ha Le, DoSE: Deobfuscation based on Semantic Equivalence, 2018.

5

Fabrizio Biondi, Thomas Given-Wilson, Axel Legay, Cassius Puodziusm, Jean Quilbeuf, Tutorial: An Overview of Malware Detection and Evasion Techniques, 2018.

6

Niccolò Marastoni, Roberto Giacobazzi, Roberto Giacobazzi, Mila Dalla Preda, A Deep Learning Approach to Program Similarity, 2018.


2017 (non exhaustive) publications that use Tigress


2016 (non exhaustive) publications that use Tigress

3

Tsong Yueh Chen, Fei-Ching Kuo, Wenjuan Ma, Willy Susilo, Dave Towey, Jeffrey Voas, and Zhi Quan Zhou, Metamorphic Testing for Cybersecurity, 2016.


2015 (non exhaustive) publications that use Tigress

1

Harshvardhan P. Joshi, Aravindhan Dhanasekaran and Rudra Dutta, Trading Off a Vulnerability: Does Software Obfuscation Increase the Risk of ROP, 2015.

2

Federico Scrinzi, Behavioral Analysis of Obfuscated Code, 2015.

3

Sebastian Banescu, Mart´ ın Ochoa and Alexander Pretschner, A Framework for Measuring Software Obfuscation Resilience Against Automated Attacks, 2015.


2012 (non exhaustive) publications that use Tigress