Research Article
Input-Output Example-Guided Data Deobfuscation on Binary
Table 1
The results of user study on data obfuscation’s resilience.
| Tools | Methods | Candidates | S1 | S2 | S3 | S4 | S5 |
| OLLVM | Const_to_b100b | | | | | | if0_b100w_bitfield_0 | | | | | | vrp07 | | | | | | Tigress | Const_to_b100b | | | | | | if0_b100w_bitfield_0 | | | | | | vrp07 | | | | | |
|
|