接着,为了防止恶意代码发现和攻击,本文利用硬件虚拟技术为LAHF设计了自隐藏模块。
Next, in order to prevent the discovery and attack by malicious code, we utilize the Hardware Virtualization Technology to design the self-hidden module for LAHF.
接着,为了防止恶意代码发现和攻击,本文利用硬件虚拟技术为LAHF设计了自隐藏模块。
Next, in order to prevent the discovery and attack by malicious code, we utilize the Hardware Virtualization Technology to design the self-hidden module for LAHF.
应用推荐