Obfuscation procedure based on the insertion of the dead code in the crypter by binary search | IEEE Conference Publication | IEEE Xplore