How to Defeat Advanced Malware: New Tools for Protection and Forensics (2015)
Chapter 1. A Primer on Detection for Security
Chapter 2. 2014 Endpoint Exploitation Trends
Chapter 3. The Proposed Solution
Chapter 4. Protection’s Weak Link
Chapter 5. Micro-Virtualization
Chapter 6. Advanced Forensics and Analysis