Return to Article Details Adapting Call-string Approach for x86 Obfuscated Binaries Download Download PDF