Archive > Volume 35 Issue 2 > 2012,35(2):65-70. DOI:10.11835/j.issn.1000-582X.2012.02.011 CSTR:[cstr] Prev Next

A malware analysis method based on symbolic execution tree