“…This phenomenon is more common in obfuscated codes, with larger dependency intervals between contexts. For instance, code virtualization [59], [63] defines lots of virtual instructions, a set of bytecode handlers that first decode the virtual instruction and then translate it into native machine code, and a dispatcher that determines which instruction is ready for execution. A complete set of virtual instructions requires a lot of code implementation, which directly leads to a wider coverage of the context of an instruction in the virtualized code.…”