Obfuscation
PhD thesis of Stéphanie Riaud (in French): http://dumas.ccsd.cnrs.fr/dumas-00636793/document
- LLVM obfuscator
Model of attacker
In the case of cyber attacks
- Attacker can run programs on the same machine
- Attacker interacts with remote machine
- buffer overflow, canari, ASLR, CFI