Buscar
Mostrando ítems 1-1 de 1
Obfuscation procedure based in dead code insertion into crypter
(IEEE, 2016)
The threat that attacks cyberspace is known as malware. In order to infect the technologic devices that are attacked, malware needs to evade the different antivirus systems. To avoid detection, an obfuscation technique ...