The document discusses code obfuscation techniques against symbolic execution attacks, outlining research questions on measuring obfuscation strength and effectiveness. It presents two experiments using various obfuscation transformations and analyzes their impact on symbolic execution time and code coverage. The findings suggest that certain obfuscation methods, such as virtualization and flattening, impede symbolic analysis significantly, while others may not contribute effectively to obfuscation goals.
Related topics: