About the Research
The techniques and data presented in this catalog are the results of our academic research paper.
Our paper also provides a measurement of real-world malware and a hunting aproach for finding undocumented persistence techniques.
Paper pdfCiting Our Work
We hope you find our work useful. You can copy the BibTeX entry below directly into your bibliography.
BibTeX
@inproceedings{BIBTEX_KEY,
author = {Author, First and Author, Second},
title = {Paper Title},
booktitle = {Proceedings of the Conference Name},
year = {202X},
pages = {1--XX},
publisher = {Publisher},
doi = {10.XXXX/XXXXXXX},
url = {https://doi.org/10.XXXX/XXXXXXX}
}