X Wang, Y Zhang, L Zhao… - … Conference on Cyber …, 2017 - ieeexplore.ieee.org
Malicious code writers often insert dead code into the source code to prevent reverse
engineer analysis. There are few methods for detecting dead code used in conjunction with …