Using Memory Management to Detect and Extract Illegitimate Code for Malware Analysis
doi 10.1145/2420950.2420979
Full Text
Open PDFAbstract
Available in full text
Date
January 1, 2012
Authors
Publisher
ACM Press
Available in full text
January 1, 2012
ACM Press