
An Approach to Reconstruction Control Flow of the Obfuscated Program
Author(s) -
И. Н. Ледовских,
М. Г. Бакулин
Publication year - 2012
Publication title -
trudy instituta sistemnogo programmirovaniâ ran/trudy instituta sistemnogo programmirovaniâ
Language(s) - English
Resource type - Journals
eISSN - 2220-6426
pISSN - 2079-8156
DOI - 10.15514/ispras-2012-22-10
Subject(s) - computer science , obfuscation , control flow , program slicing , control flow graph , programming language , virtualization , data flow analysis , program comprehension , dead code , theoretical computer science , reverse engineering , source code , symbolic execution , data flow diagram , redundant code , code generation , operating system , debugging , database , cloud computing , software , computer security , key (lock) , software system