-
1by Wei Wang, Meng Li, Zhanyong Tang, Huanting Wang, Guixin Ye, Fuwei Wang, Jie Ren, Xiaoqing Gong, Dingyi Fang, Zheng Wang“...) technologies is emerging as a feasible method for accomplishing code obfuscation. However, in some State...”
Published 2019-01-01
Get full text
Article -
2by Shuai Wang, Guixin Ye, Meng Li, Lu Yuan, Zhanyong Tang, Huanting Wang, Wei Wang, Fuwei Wang, Jie Ren, Dingyi Fang, Zheng Wang“...Code obfuscation built upon code virtualization technology is one of the viable means...”
Published 2019-01-01
Get full text
Article