Login / Signup
Using memory management to detect and extract illegitimate code for malware analysis.
Carsten Willems
Felix C. Freiling
Thorsten Holz
Published in:
ACSAC (2012)
Keyphrases
</>
static analysis
memory management
real time
source code
dynamic analysis
distributed databases