Research Article

Input-Output Example-Guided Data Deobfuscation on Binary

Figure 4

Comparison of data flow obfuscation strategies between Tigress and OLLVM. (a) Tigress. (b) OLLVM.
(a)
(b)