Return to Article Details Overview of static methods of analysis malicious software Download Download PDF