1. A Method for Detecting Obfuscated Calls in Malicious Binaries Arun Lakhotia, Eric Uday Kumar, and Michael Venable Abstract—Information about calls to the operating system…