Reverse Analysis into Stealing-information Trojan through “Reconstructing Execution Path”

XU Guotian

Forensic Science and Technology ›› 2019, Vol. 44 ›› Issue (4) : 283-288. DOI: 10.16467/j.1008-3650.2019.04.001
Research Articles

Reverse Analysis into Stealing-information Trojan through “Reconstructing Execution Path”

    {{javascript:window.custom_author_en_index=0;}}
  • {{article.zuoZhe_EN}}
Author information +
History +

HeighLight

{{article.keyPoints_en}}

Abstract

{{article.zhaiyao_en}}

Key words

Cite this article

Download Citations
{{article.zuoZheEn_L}}. {{article.title_en}}. {{journal.qiKanMingCheng_EN}}. 2019, 44(4): 283-288 https://doi.org/10.16467/j.1008-3650.2019.04.001

References

References

{{article.reference}}

Funding

RIGHTS & PERMISSIONS

{{article.copyrightStatement_en}}
{{article.copyrightLicense_en}}

Accesses

Citation

Detail

Sections
Recommended

/