1. Dynamic program slicing
2. Christian Ammann . 2012 . Hyperion: Implementation of a PE-Crypter. Christian Ammann. 2012. Hyperion: Implementation of a PE-Crypter.
3. Data obfuscation: anonymity and desensitization of usable data sets
4. Gogul Balakrishnan and Thomas Reps . 2004. Analyzing Memory Accesses in x86 Executables . In Compiler Construction, Evelyn Duesterwald (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg , 5--23. Gogul Balakrishnan and Thomas Reps. 2004. Analyzing Memory Accesses in x86 Executables. In Compiler Construction, Evelyn Duesterwald (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 5--23.
5. Code obfuscation against symbolic execution attacks