Bryant, R. E. (1991). On the complexity of vlsi imple-
mentations and graph representations of boolean func-
tions with application to integer multiplication. IEEE
Transactions on Computers, 40(2).
Cadar, C. and Sen, K. (2013). Symbolic Execution for Soft-
ware Testing: Three Decades Later. Commun. ACM,
56(2).
Ceccato, M., Tonella, P., Basile, C., Coppens, B., De Sut-
ter, B., Falcarin, P., and Torchiano, M. (2017). How
professional hackers understand protected code while
performing attack tasks. In ICPC’17.
Cheng, X., Lin, Y., Gao, D., and Jia, C. (2019). DynOpVm:
VM-Based Software Obfuscation with Dynamic Op-
code Mapping. In Applied Cryptography and Network
Security.
Collberg, C. and Nagra, J. (2009). Surreptitious Software:
Obfuscation, Watermarking, and Tamperproofing for
Software Protection. Addison-Wesley Professional.
Collberg, C., Thomborson, C., and Low, D. (1997). A tax-
onomy of obfuscating transformations. Technical re-
port, Univ. of Auckland.
Collberg, C. S. and Thomborson, C. (2002). Watermarking,
tamper-proofing, and obfuscation - tools for software
protection. IEEE Trans. on Soft. Eng., 28(8).
Coogan, K., Lu, G., and Debray, S. (2011). Deobfuscation
of virtualization-obfuscated software: A semantics-
based approach. In CCS’11.
De Micheli, G. (1994). Synthesis and Optimization of Dig-
ital Circuits. McGraw-Hill Higher Education.
Eyrolles, N., Goubin, L., and Videau, M. (2016). Defeating
MBA-Based Obfuscation. In SPRO’16.
Falcarin, P., Collberg, C., Atallah, M., and Jakubowski, M.
(2011). Guest editors’ introduction: Software protec-
tion. IEEE Software, 28(2).
Hansen, M. C., Yalcin, H., and Hayes, J. P. (1999). Un-
veiling the ISCAS-85 Benchmarks: A Case Study in
Reverse Engineering. IEEE Des. Test, 16(3).
Holder, W., McDonald, J. T., and Andel, T. R. (2017). Eval-
uating optimal phase ordering in obfuscation execu-
tives. In 7th SSPREW.
Junod, P., Rinaldini, J., Wehrli, J., and Michielin, J.
(2015). Obfuscator-LLVM – Software Protection for
the Masses. In SPRO’15.
Kuznetsov, V., Kinder, J., Bucur, S., and Candea, G. (2012).
Efficient state merging in symbolic execution. In
PLDI’12.
Lan, P., Wang, P., Wang, S., and Wu, D. (2018). Lambda
obfuscation. In SecureComm’17.
Manikyam, R., McDonald, J. T., Mahoney, W. R., Andel,
T. R., and Russ, S. H. (2016). Comparing the effec-
tiveness of commercial obfuscators against mate at-
tacks. In SSPREW’16.
Ollivier, M., Bardin, S., Bonichon, R., and Marion, J.
(2019a). Obfuscation: where are we in anti-dse pro-
tections (a first attempt). In SSPREW ’19.
Ollivier, M., Bardin, S., Bonichon, R., and Marion, J.-Y.
(2019b). How to Kill Symbolic Deobfuscation for
Free (or: Unleashing the Potential of Path-Oriented
Protections). In ACSAC’19.
Rival, X. and Yi, K. (2020). Introduction to Static Analy-
sis: An Abstract Interpretation Perspective. The MIT
Press.
Salwan, J., Bardin, S., and Potet, M.-L. (2018). Symbolic
deobfuscation: From virtualized code back to the orig-
inal. In DIMVA’18.
Schleimer, S., Wilkerson, D. S., and Aiken, A. (2003). Win-
nowing: Local algorithms for document fingerprint-
ing. In ICMD’03.
Schrittwieser, S., Katzenbeisser, S., Kinder, J., Merzdovnik,
G., and Weippl, E. (2016). Protecting software
through obfuscation: Can it keep pace with progress
in code analysis? ACM Comput. Surv., 49(1).
Subramanyan, P., Ray, S., and Malik, S. (2015). Evalu-
ating the security of logic encryption algorithms. In
HOST’15.
Vahid, F. (2007). It’s time to stop calling circuits ”hard-
ware”. Computer, 40(9).
Woelfel, P. (2005). Bounds on the obdd-size of integer mul-
tiplication via universal hashing. Journal of Computer
and System Sciences, 71(4).
Yadegari, B., Johannesmeyer, B., Whitely, B., and Debray,
S. (2015). A generic approach to automatic deobfus-
cation of executable code. In S&P’15.
Zhou, Y., Main, A., Gu, Y. X., and Johnson, H. (2007).
Information hiding in software with mixed boolean-
arithmetic transforms. In WISA’07.
SECRYPT 2021 - 18th International Conference on Security and Cryptography
258