1. Alsaleh, M.N., Wei, J., Al-Shaer, E., et al.: gExtractor: Towards automated extraction of malware deception parameters. In: Proceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop (2018)
2. Avllazagaj, E., Zhu, Z., Bilge, L., et al.: When malware changed its mind: an empirical study of variable program behaviors in the real world. In: Proceedings of the 30th USENIX Security Symposium, pp. 3487–3504 (2021)
3. Branco, R.R., Barbosa, G.N., Neto, P.D.: Scientific but not academical overview of malware anti-debugging, anti-disassembly and anti-VM technologies. Black Hat USA 2012 (2012)
4. Bremer, J.: Cuckoo sandbox and its recent developments. SECURE 2014 (2014)
5. Chailytko, A., Skuratovich, S.: Defeating sandbox evasion: How to increase successful emulation rate in your virtualized environment. In: Proceedings of the 26th Virus Bulletin Conference (2016)