Obfuscation procedure based in dead code insertion into crypter | IEEE Conference Publication | IEEE Xplore