Text
Automatic malware analysis: an emulator based approach
Table of contents:
1. Introduction
2. Dynamic Binary Analysis Platform
3. Hidden Code Extraction
4. Privacy-breaching Behavior Analysis
5. Hooking Behavior Analysis
6. Analysis of trigger conditions and hidden behaviors
7. Concluding remarks
No other version available