Abstract: Existing code obfuscation techniques introduce bogus control flow and string obfuscation to conceal program logic and hardcoded sensitive information but exhibit insufficient code semantic ...
Abstract: Neural code models (NCMs) have demonstrated extraordinary capabilities in code intelligence tasks. Meanwhile, the security of NCMs and NCMs-based systems has garnered increasing attention.
一些您可能无法访问的结果已被隐去。
显示无法访问的结果