基于“执行路径重建”的盗号木马逆向分析取证方法研究
徐国天
Reverse Analysis into Stealing-information Trojan through “Reconstructing Execution Path”
XU Guotian
局部代码分析