1. detection and analysis of drive-by-download attacks and malicious javascript code;Cova,2010
2. The Cuckoo Sandbox, http://www.cuckoosandbox.org/.
3. Thug, http://buffer.github.io/thug/.
4. WebKit2, https://trac.webkit.org/wiki/WebKit2.
5. YARA, http://plusvic.github.io/yara/.