LLVM-based Software Tamperproofing
oblivious hashing
self-checksumming
call stack integrity verification
optimized protection composition framework using integer linear programming
graph-sage machine-learning attacks on software protection
_ _ _
| | | | | |
____ ___ | | __ ___ _____ ____ _____| | __ ____ _____ __| | _ _
| \ / _ \| _ \ /___) ___ | _ \ (____ | _ \| \( ____ | / _ | | | |
| | | | | _| | | | | ___ | ____| | | | _/ ___ | | | | | | / ___ ( (_| | \ V /
| _| _| _| \_ __/| _| | _(___/| _____)_| | _(_)_____| _| | _| _| _| _\_ ____| \_ ___| \_ /
_____ _ _
/ __ \ (_) |
| | / )___ ____ _____ _| | ____ ___ ____
| | \_ _/ _ | \( ____ | | | / ___) _ \| \
| | ___( (_| | | | / ___ | | | ( (__| | _| | | | |
\_ ____)___ | _| _| _\_ ____| _| \_ | _)____)___/| _| _| _|
(_____|