Constructing method of opaque predicate based on type conversion and operation of floating point numbers
With the increasing complexity of software functions and the evolving technologies of network attacks, malicious behaviors such as software piracy, software cracking, data leakage, and malicious software modification are on the rise.As a result, software security has become a focal point in industry...
Saved in:
Main Authors: | Qingfeng WANG, Hao LIANG, Yawen WANG, Genlin XIE, Benwei HE |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2023-10-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023068 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
The problem with Opaque AI
by: Asher Austen Fainman
Published: (2019-10-01) -
Metrics for code obfuscation based on symbolic execution and N-scope complexity
by: Yuqiang XIAO, et al.
Published: (2022-12-01) -
Exégèse et prédication (IXe-XIIe siècle)
by: Sumi Shimahara, et al.
Published: (2009-08-01) -
Exégèse et prédication (IXe-XIIe siècle)
by: Sumi Shimahara, et al.
Published: (2008-08-01) -
Unraveling the interactive effect of opaque2 and waxy1 genes on kernel nutritional qualities and physical properties in maize (Zea mays L.)
by: Subhra J. Mishra, et al.
Published: (2025-01-01)