Interesting paper
<<...Malicious codes commonly use packers, obfuscators, and polymorphism to hinder static-analysis and evade detection by making analyses difficult to reverse-engineer...>>
<<...Here we are interested in classifying into the 7 obfuscation techniques: Opaque predicates, bogus control flow, control-flow flattening using O-LLVM or Tigress, instruction substitution, virtualization, or packing...>>
Next Step in the arm race
NSA employee: "..uh boss? We need to beef up our EM noise generator algorithms to make it quasi impossible for these detectors to find out useful patterns and pollute their CNN..."