Inproceedings,

Using memory management to detect and extract illegitimate code for malware analysis.

, , and .
ACSAC, page 179-188. ACM, (2012)

Meta data

Tags

Users

  • @dblp

Comments and Reviews