Techniques for evading automated analysis
Abhishek Singh looks at some of the techniques that are commonly
used by malware to bypass analysis in a virtualized environment.
Copyright © 2013 Virus Bulletin
The full article is available to registered users. Click here for free registration or, if you already are a registered user, login to access the full article.