Return to Article Details Functional model of reverse engineering malware Download Download PDF