Proteus: virtualization for diversified tamper-resistance, Proceedings of the Sixth ACM Workshop on Digital Rights Management, pp.47-58, 2006. ,
A survey of symbolic execution techniques, ACM Comput. Surv, vol.51, issue.3, 2018. ,
Code obfuscation against symbolic execution attacks, Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, pp.189-200, 2016. ,
Predicting the resilience of obfuscated code against symbolic execution attacks via machine learning, 26th USENIX Security Symposium, pp.661-678, 2017. ,
Backward-bounded DSE: targeting infeasibility questions on obfuscated codes, 2017 IEEE Symposium on Security and Privacy, pp.633-651, 2017. ,
URL : https://hal.archives-ouvertes.fr/cea-01808887
Lamine Noureddine, and Vivek Verma. Effective, efficient, and robust packing detection and classification, Computers & Security, vol.85, pp.436-451, 2019. ,
Learning multi-label scene classification, Pattern Recognition, vol.37, issue.9, pp.1757-1771, 2004. ,
Bagging predictors, Machine Learning, vol.24, pp.123-140, 1996. ,
A general model for hiding control flow, Proceedings of the 10th ACM Workshop on Digital Rights Management, pp.35-42, 2010. ,
An approach to the obfuscation of control-flow of sequential computer programs, Information Security, 4th International Conference, vol.2200, pp.144-155, 2001. ,
The Tigress C Diversifier/Obfuscator ,
Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection, 2009. ,
A taxonomy of obfuscating transformations, 1997. ,
Manufacturing cheap, resilient, and stealthy opaque constructs, POPL '98, Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.184-196, 1998. ,
,
Feedback-driven binary code diversification, TACO, vol.9, issue.4, 2013. ,
Miasm : Framework de reverse engineering, 2012. ,
Ensemble methods in machine learning, Proceedings of the First International Workshop on Multiple Classifier Systems, MCS '00, pp.1-15, 2000. ,
Boosting a weak learning algorithm by majority, Proceedings of the Third Annual Workshop on Computational Learning Theory, COLT 1990, pp.202-216, 1990. ,
Experiments with a new boosting algorithm, Machine Learning, Proceedings of the Thirteenth International Conference (ICML '96), pp.148-156, 1996. ,
Bayesian network classifiers, Mach. Learn, vol.29, issue.2-3, pp.131-163, 1997. ,
A secure and robust approach to software tamper resistance, Information Hiding -12th International Conference, IH 2010, vol.6387, pp.33-47, 2010. ,
Discriminative methods for multilabeled classification, Advances in Knowledge Discovery and Data Mining, 8th Pacific-Asia Conference, vol.3056, pp.22-30, 2004. ,
, Feature Extraction: Foundations and Applications (Studies in Fuzziness and Soft Computing)
, , 2006.
The elements of statistical learning: data mining, inference, and prediction, 2nd Edition. Springer series in statistics, 2009. ,
,
Classification Algorithms, 1985. ,
Obfuscator-LLVM -software protection for the masses, Proceedings of the IEEE/ACM 1st International Workshop on Software Protection, SPRO'15, pp.3-9, 2015. ,
Exploiting self-modification mechanism for program protection, 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, p.170, 2003. ,
Subvirt: Implementing malware with virtual machines, 2006 IEEE Symposium on Security and Privacy, pp.314-327, 2006. ,
A study of cross-validation and bootstrap for accuracy estimation and model selection, Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, vol.95, pp.1137-1145, 1995. ,
Supervised machine learning: A review of classification techniques, Proceedings of the 2007 Conference on Emerging Artificial Intelligence Applications in Computer Engineering: Real Word AI Systems with Applications in eHealth, HCI, Information Retrieval and Pervasive Technologies, pp.3-24, 2007. ,
Supervised machine learning: A review of classification techniques, Informatica (Slovenia), vol.31, issue.3, pp.249-268, 2007. ,
Context-sensitive analysis without calling-context. Higher-Order and Symbolic Computation, vol.23, pp.275-313, 2010. ,
Obfuscating c++ programs via control flow flattening ,
Detecting emotion in music, ISMIR 2003, 4th International Conference on Music Information Retrieval, 2003. ,
Obfuscation of executable code to improve resistance to static disassembly, Proceedings of the 10th ACM Conference on Computer and Communications Security, pp.290-299, 2003. ,
Popular ensemble methods: An empirical study, 2011. ,
Software protection through dynamic code mutation, Information Security Applications, 6th International Workshop, WISA 2005, vol.3786, pp.194-206, 2005. ,
Introduction to Information Retrieval, 2008. ,
LOOP: logic-oriented opaque predicate detection in obfuscated binary code, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp.757-768, 2015. ,
A framework for obfuscated interpretation, ACSW Workshops -the Australasian Information Security Workshop (AISW2004), pp.7-16, 2004. ,
How to kill symbolic deobfuscation for free; or unleashing the potential of path-oriented protections, Proceedings of the 35th Annual Computer Security Applications Conference, ACSAC 2019, 2019. ,
Scikit-learn: Machine learning in Python, Journal of Machine Learning Research, vol.12, pp.2825-2830, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00650905
Binary obfuscation using signals, Proceedings of the 16th USENIX Security Symposium, 2007. ,
Opaque predicates detection by abstract interpretation, Algebraic Methodology and Software Technology, 11th International Conference, pp.81-95, 2006. ,
, GNU Project. GNU Core Utilities, 2002.
Classifier chains for multi-label classification, Machine Learning, vol.85, issue.3, pp.333-359, 2011. ,
Classifier chains for multi-label classification, Mach. Learn, vol.85, issue.3, pp.333-359, 2011. ,
Ensemble-based classifiers, Artif. Intell. Rev, vol.33, issue.1-2, pp.1-39, 2010. ,
Data Mining With Decision Trees: Theory and Applications, 2014. ,
Metadata recovery from obfuscated programs using machine learning, Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, vol.2016, pp.1-1, 2016. ,
Symbolic deobfuscation: From virtualized code back to the original, Detection of Intrusions and Malware, and Vulnerability Assessment -15th International Conference, DIMVA 2018, pp.372-392, 2018. ,
Code obfuscation against static and dynamic reverse engineering, Information Hiding -13th International Conference, vol.6958, pp.270-284, 2011. ,
Protecting software through obfuscation: Can it keep pace with progress in code analysis?, ACM Comput. Surv, vol.49, issue.1, 2016. ,
Linearly combining density estimators via stacking, Machine Learning, vol.36, pp.59-83, 1999. ,
Making an accurate classifier ensemble by voting on classifications from imputed learning sets, vol.IJIDS, pp.301-322, 2009. ,
Pattern recognition techniques for the classification of malware packers, Information Security and Privacy -15th Australasian Conference, vol.6168, pp.370-390, 2010. ,
Instruction set limitation in support of software diversity, Information Security and Cryptology -ICISC 2008, 11th International Conference, vol.5461, pp.152-165, 2008. ,
Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis, 3rd International Workshop on Software PROtection, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02269192
DoSE: Deobfuscation based on Semantic Equivalence, Proceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop, vol.1, pp.1-1, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01964550
Multi-label classification: An overview, vol.IJDWM, pp.1-13, 2007. ,
Deobfuscation: Reverse engineering obfuscated code, 12th Working Conference on Reverse Engineering, pp.45-54, 2005. ,
Semi-supervised learning for packed executable detection, 5th International Conference on Network and System Security, pp.342-346, 2011. ,
Program obfuscation by strong cryptography, ARES 2010, Fifth International Conference on Availability, Reliability and Security, pp.242-247, 2010. ,
Protection of software-based survivability mechanisms, 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), pp.193-202, 2001. ,
Hacker's Delight, 2012. ,
Generalized dynamic opaque predicates: A new control flow obfuscation method, Information Security -19th International Conference, pp.323-342, 2016. ,
Manufacturing resilient bi-opaque predicates against symbolic execution, 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018, pp.666-677, 2018. ,
A generic approach to automatic deobfuscation of executable code, 2015 IEEE Symposium on Security and Privacy, pp.674-691, 2015. ,
Binary relevance for multi-label learning: An overview, Front. Comput. Sci, vol.12, issue.2, pp.191-202, 2018. ,
Multilabel neural networks with applications to functional genomics and text categorization, IEEE Trans. on Knowl. and Data Eng, vol.18, issue.10, pp.1338-1351, 2006. ,
Ml-knn: A lazy learning approach to multilabel learning, Pattern Recogn, vol.40, issue.7, pp.2038-2048, 2007. ,