Constructing method of opaque predicate based on type conversion and operation of floating point numbers

With the increasing complexity of software functions and the evolving technologies of network attacks, malicious behaviors such as software piracy, software cracking, data leakage, and malicious software modification are on the rise.As a result, software security has become a focal point in industry...

Full description

Saved in:
Bibliographic Details
Main Authors: Qingfeng WANG, Hao LIANG, Yawen WANG, Genlin XIE, Benwei HE
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2023-10-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023068
Tags: Add Tag
No Tags, Be the first to tag this record!