Score: 0

ReSMT: An SMT-Based Tool for Reverse Engineering

Published: December 26, 2025 | arXiv ID: 2512.22076v1

By: Nir Somech, Guy Katz

Potential Business Impact:

Unlocks hidden computer code secrets automatically.

Business Areas:
E-Signature Information Technology, Privacy and Security

Software obfuscation techniques make code more difficult to understand, without changing its functionality. Such techniques are often used by authors of malicious software to avoid detection. Reverse Engineering of obfuscated code, i.e., the process of overcoming obfuscation and answering questions about the functionality of the code, is notoriously difficult; and while various tools and methods exist for this purpose, the process remains complex and slow, especially when dealing with layered or customized obfuscation techniques. Here, we present a novel, automated tool for addressing some of the challenges in reverse engineering of obfuscated code. Our tool, called ReSMT, converts the obfuscated assembly code into a complex system of logical assertions that represent the code functionality, and then applies SMT solving and simulation tools to inspect the obfuscated code's execution. The approach is mostly automatic, alleviating the need for highly specialized deobfuscation skills. In an elaborate case study that we conducted, ReSMT successfully tackled complex obfuscated code, and was able to solve reverse-engineering queries about it. We believe that these results showcase the potential and usefulness of our proposed approach.

Country of Origin
🇮🇱 Israel

Page Count
25 pages

Category
Computer Science:
Cryptography and Security