Return to Article Details Some approaches to lock malicious "traps" in the programs Download Download PDF