Login / Signup

Using memory management to detect and extract illegitimate code for malware analysis.

Carsten WillemsFelix C. FreilingThorsten Holz
Published in: ACSAC (2012)
Keyphrases
  • static analysis
  • memory management
  • real time
  • source code
  • dynamic analysis
  • distributed databases