基于“执行路径重建”的盗号木马逆向分析取证方法研究
徐国天

Reverse Analysis into Stealing-information Trojan through “Reconstructing Execution Path”
XU Guotian
设置断点获取电子邮件相关数据