Research Article

Malware Analysis Using Visualized Image Matrices

Figure 18

Changes in execution trace size following the application of repetition filtering and major block selection.
132713.fig.0018