2018 IEEE 18th International Working Conference on Source Code Analysis and Manipulation (SCAM) 2018
DOI: 10.1109/scam.2018.00010
|View full text |Cite
|
Sign up to set email alerts
|

[Research Paper] Combining Obfuscation and Optimizations in the Real World

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…Similarly, Liu et al [24] presented a technique that uses an iterative search-based algorithm to identify an optimal sequence of obfuscations over particular partitions of a given program. Guelton et al [19] identified a set of arising conflicts amongst obfuscations provided in two open source engines (namely Tigress and O-LLVM) and clang optimization passes. Su et al [29] proposed the design of a composition technique using Petri nets and inhibitor arcs to compute a sequence in which protections should be applied, in order to avoid conflicts, to a program.…”
Section: Composition Of Protectionsmentioning
confidence: 99%
“…Similarly, Liu et al [24] presented a technique that uses an iterative search-based algorithm to identify an optimal sequence of obfuscations over particular partitions of a given program. Guelton et al [19] identified a set of arising conflicts amongst obfuscations provided in two open source engines (namely Tigress and O-LLVM) and clang optimization passes. Su et al [29] proposed the design of a composition technique using Petri nets and inhibitor arcs to compute a sequence in which protections should be applied, in order to avoid conflicts, to a program.…”
Section: Composition Of Protectionsmentioning
confidence: 99%