Research on the technology of concealing the character of binary codes based on equal transposition

The concealing of binary code is a key technology in the field of information security. Through in-depth study of this technology, it can not only provide theoretical support for detection of malicious code, but also play a role in promoting the development of network attack techniques. We combine the technology of equal transposition with the character… CONTINUE READING