High demand exists nowadays to improve advanced obfuscation and deobfuscation techniques, with the purpose of preventing intellectual property piracy or improving defence against cyber security attacks. This thesis focuses on the improvement of the deobfuscation achieved by symbolic and concrete analysis tools of protected programs using opaque predicates. These tools rely on automated program analysis tools (dynamic symbolic execution engine) that use Satisfiability Modulo Theory solvers (SMT solvers). To understand more precisely some situations in which the predicate analysis performed by these tools fails, our aim is to be able to identify practical solutions to avoid these scenarios and test them in real cases. First results show how a...
International audienceCode obfuscation is a major tool for protecting software intellectual property...
Obfuscation is used to protect programs from analysis and reverse engineering. There are theoretical...
In recent years code obfuscation has attracted research interest as a promising technique for protec...
High demand exists nowadays to improve advanced obfuscation and deobfuscation techniques, with the p...
Une forte demande existe aujourd’hui pour améliorer les techniques avancées d’obfuscation et de déob...
International audienceWe present a new approach that bridges binary analysis techniques with machine...
Code obfuscation and software watermarking are well known techniques designed to prevent the illeg...
Opaque predicates are a commonly used technique in program obfuscation, intended to add complexity t...
Opaque predicates are a well-established fundamental building block for software obfuscation. Simpli...
In this thesis we have studied different deobfuscation approaches toward a static evaluation of obfu...
Control code obfuscation is intended to prevent malicious reverse engineering of software by masking...
International audienceControl flow obfuscation techniques can be used to hinder software r...
Cette thèse a été faite dans un cadre industriel où les activités principales sont la rétro-ingénier...
Malware analysis is a growing research field due to the criticity and variety of assets targeted as ...
This doctoral work has been done in an industrial environment where the mainactivities were reverse ...
International audienceCode obfuscation is a major tool for protecting software intellectual property...
Obfuscation is used to protect programs from analysis and reverse engineering. There are theoretical...
In recent years code obfuscation has attracted research interest as a promising technique for protec...
High demand exists nowadays to improve advanced obfuscation and deobfuscation techniques, with the p...
Une forte demande existe aujourd’hui pour améliorer les techniques avancées d’obfuscation et de déob...
International audienceWe present a new approach that bridges binary analysis techniques with machine...
Code obfuscation and software watermarking are well known techniques designed to prevent the illeg...
Opaque predicates are a commonly used technique in program obfuscation, intended to add complexity t...
Opaque predicates are a well-established fundamental building block for software obfuscation. Simpli...
In this thesis we have studied different deobfuscation approaches toward a static evaluation of obfu...
Control code obfuscation is intended to prevent malicious reverse engineering of software by masking...
International audienceControl flow obfuscation techniques can be used to hinder software r...
Cette thèse a été faite dans un cadre industriel où les activités principales sont la rétro-ingénier...
Malware analysis is a growing research field due to the criticity and variety of assets targeted as ...
This doctoral work has been done in an industrial environment where the mainactivities were reverse ...
International audienceCode obfuscation is a major tool for protecting software intellectual property...
Obfuscation is used to protect programs from analysis and reverse engineering. There are theoretical...
In recent years code obfuscation has attracted research interest as a promising technique for protec...