Inverted timing attacks are used by evasive malware authors to bypass typical dynamic malware analysis systems. Not so with Lastline's full-system emulation approach.
Sign in to post comments.
Comments (0)
Sign in to post comments.