Buscar
Mostrando ítems 1-1 de 1
Obfuscation procedure based on the insertion of the dead code in the crypter by binary search
(IEEE, 2018)
What threatens the cyberspace is known as malware, which in order to infect the technological devices, it has to be capable of bypassing the antivirus motor. To avoid the antivirus detection, the malicious code requires ...