Login / Signup
Memory behavior-based automatic malware unpacking in stealth debugging environment.
Yuhei Kawakoya
Makoto Iwamura
Mitsutaka Itoh
Published in:
MALWARE (2010)
Keyphrases
</>
memory usage
real time
mobile robot
dynamic environments
semi automatic
data structure
reverse engineering
complex environments
database
case study
database management systems
virtual world
main memory
memory space
control architecture
dynamic analysis