Using Memory Management to Detect and Extract Illegitimate Code for Malware Analysis

doi 10.1145/2420950.2420979
Full Text
Abstract

Available in full text

Date
Authors
Publisher

ACM Press