基于“执行路径重建”的盗号木马逆向分析取证方法研究
徐国天

Reverse Analysis into Stealing-information Trojan through “Reconstructing Execution Path”
XU Guotian
调用流程分析