Refrences:
1.Global Research & Analysis Team (GReAT), Equation group: Questions and answers", Kaspersky Labs, https://securelist.com/_les/2015/02/Equation group questions and answers.pdf Online. Retrieved on 25th Feb 2015.
2. sKyWIper Analysis Team skywiper: A complex malware for targeted attacks", Tech. Rep., Laboratory of Cryptography and System Security (CrySyS Lab), Budapest University of Technology and Economics (2012).
3. Rolles, R. Unpacking virtualization obfuscators", 3rd USENIX Conference on O_ensive Technologies, USENIX Association, pp. 1-1 (2009).
4. Kinder, J. Towards static analysis of virtualizationobfuscated binaries", 19th Working Conference on Reverse Engineering (WCRE), IEEE, pp. 61-70 (2012). 5. Yadegari, B., Johannesmeyer, B., Whitely, B., et al. A generic approach to automatic deobfuscation of executable code", 2015 IEEE Symposium on Security and Privacy, IEEE, pp. 674-691 (2015). 6. Sharif, M., Lanzi, A., Gi_n, J., et al. Automatic reverse engineering of malware emulators", 30th IEEE Symposium on Security and Privacy, IEEE, pp. 94-109 (2009). 7. Newsome, J., Karp, B., and Song, D. Polygraph: Automatically generating signatures for polymorphic worms", IEEE Symposium on Security and Privacy, IEEE, pp. 226-241 (2005).