Abstract
Software obfuscation techniques can prevent binary diffing techniques from locating vulnerable code by obfuscating the third-party code, to achieve th......
小提示:本篇文献需要登录阅读全文,点击跳转登录