1. [n.d.]. Automated Detection of Control-flow Flattening. Avariable: https://synthesis.to/2021/03/03/flattening_detection.html . Accessed : Dec. 04, 2014 . [n.d.]. Automated Detection of Control-flow Flattening. Avariable: https://synthesis.to/2021/03/03/flattening_detection.html. Accessed: Dec. 04, 2014.
2. [n.d.]. Deobfuscate OLLVM control flow flattening by using Ghidra P-code. Avariable: http://rk700.github.io/2020/08/03/ghidra-ollvm-deobfuscation/ . Accessed : Feb. 10, 2022 . [n.d.]. Deobfuscate OLLVM control flow flattening by using Ghidra P-code. Avariable: http://rk700.github.io/2020/08/03/ghidra-ollvm-deobfuscation/. Accessed: Feb. 10, 2022.
3. [n.d.]. Deobfuscation : recovering an OLLVM-protected program. Avariable: https://blog.quarkslab.com/deobfuscation-recovering-an-ollvm-protected-program.html . Accessed : Dec. 04, 2014 . [n.d.]. Deobfuscation: recovering an OLLVM-protected program. Avariable: https://blog.quarkslab.com/deobfuscation-recovering-an-ollvm-protected-program.html. Accessed: Dec. 04, 2014.
4. [n.d.]. MO Deflattener - Miasm’s OLLVM Deflattener . Avariable : https://mrt4ntr4.github.io/MODeflattener/ . Accessed : Jun. 26, 2021 . [n.d.]. MODeflattener - Miasm’s OLLVM Deflattener. Avariable: https://mrt4ntr4.github.io/MODeflattener/. Accessed: Jun. 26, 2021.
5. [n.d.]. Reverse Engineering Snapchat (Part I): Obfuscation Techniques. Avariable: https://hot3eed.github.io/snap_part1_obfuscations.html . Accessed : Jun. 18, 2020 . [n.d.]. Reverse Engineering Snapchat (Part I): Obfuscation Techniques. Avariable: https://hot3eed.github.io/snap_part1_obfuscations.html. Accessed: Jun. 18, 2020.