Introduction.- Dynamic Binary Analysis Platform.- Hidden Code Extraction.- Privacy-breaching Behavior Analysis.- Hooking Behavior Analysis.- Analysis of Trigger Conditions and Hidden Behaviors.- Concluding Remarks.
"synopsis" may belong to another edition of this title.