P Zhang,
C Wu, M Peng, K Zeng, D Yu, Y Lai… - Proceedings of the 21st …, 2023 - dl.acm.org
Software obfuscation techniques can prevent binary diffing techniques from locating
vulnerable code by obfuscating the third-party code, to achieve the purpose of protecting …