LLVM-based Software Tamperproofing
- oblivious hashing
- self-checksumming
- call stack integrity verification
- optimized protection composition framework using integer linear programming
- graph-sage machine-learning attacks on software protection
![Connect on LinkedIn](https://camo.githubusercontent.com/1576d0a5518756e4565365bfbba43fe8651a629885cefe6223c1d79ee420188d/68747470733a2f2f696d672e736869656c64732e696f2f62616467652f2d2d6c696e6b6564696e3f6c6162656c3d4c696e6b6564496e266c6f676f3d4c696e6b6564496e267374796c653d736f6369616c)
_ _ _
| | | | | |
____ ___ | |__ ___ _____ ____ _____| |__ ____ _____ __| |_ _
| \ / _ \| _ \ /___) ___ | _ \ (____ | _ \| \(____ |/ _ | | | |
| | | | |_| | | | |___ | ____| | | |_/ ___ | | | | | | / ___ ( (_| |\ V /
|_|_|_|\___/|_| |_(___/|_____)_| |_(_)_____|_| |_|_|_|_\_____|\____| \_/
_____ _ _
/ __ \ (_) |
| | / )___ ____ _____ _| | ____ ___ ____
| | \__/ _ | \(____ | | | / ___) _ \| \
| |___( (_| | | | / ___ | | | ( (__| |_| | | | |
\_____)___ |_|_|_\_____|_|\_|_)____)___/|_|_|_|
(_____|