Proceedings of the 32nd Annual Conference on Computer Security Applications 2016
DOI: 10.1145/2991079.2991114
|View full text |Cite
|
Sign up to set email alerts
|

Code obfuscation against symbolic execution attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
97
0
1

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 110 publications
(100 citation statements)
references
References 41 publications
0
97
0
1
Order By: Relevance
“…Let us now protect the program with standard obfuscations to measure their impact on symbolic deobfuscation. We will rely on Tigress [21], a widely used tool for systematic evaluation of deobfuscation methods [5,8,35], to apply (nested) virtualization, a most effective obfuscation [5]. Yet, Table 1 clearly shows that virtualization does not prevent KLEE from finding the winning output, though it can thwart path exploration -but with a high runtime overhead (40×).…”
Section: Motivating Examplementioning
confidence: 99%
See 2 more Smart Citations
“…Let us now protect the program with standard obfuscations to measure their impact on symbolic deobfuscation. We will rely on Tigress [21], a widely used tool for systematic evaluation of deobfuscation methods [5,8,35], to apply (nested) virtualization, a most effective obfuscation [5]. Yet, Table 1 clearly shows that virtualization does not prevent KLEE from finding the winning output, though it can thwart path exploration -but with a high runtime overhead (40×).…”
Section: Motivating Examplementioning
confidence: 99%
“…concolic execution) [17,28,38] use logical formulas to represent input constraints along an execution path, and then automatically solve these constraints to discover new execution paths. DSE appears to be very efficient against existing obfuscations [5,8,22,35,49], combining the best of dynamic and semantic analysis.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Another work, [4], aims at predicting the resiliency of obfuscated code against symbolic execution attacks. They use machine learning to measure the ability of several different symbolic execution engines to run against various layers and combinations of obfuscation techniques.…”
Section: Related Workmentioning
confidence: 99%
“…opaque predicates. Several works use two-ways opaque predicates constructs, either referred to as range-dividers [4], or as correlated opaque predicates [42,69]. Moreover, regardless of their output, e.g.…”
Section: Opaquementioning
confidence: 99%