This document discusses automated static deobfuscation in the context of reverse engineering. It describes challenges with deobfuscation like side effects, code blowup, and address mapping. It summarizes the authors' approach of translating obfuscated assembly to REIL and running algorithms on it. However, it notes limitations like inability to debug and side effects. It considers alternatives like effect comments, formula extraction, and a full compiler to better address problems but notes the significant work required.