We described all kinds of obfuscating methods as viewed from byte code and designed effective method to produce redundant code.
论文从字节码的角度描述了不同的混淆方法,并设计了有效的方法来产生冗余代码。
We described all kinds of obfuscating methods as viewed from byte code and designed effective method to produce redundant code.
论文从字节码的角度描述了不同的混淆方法,并设计了有效的方法来产生冗余代码。
应用推荐