Figure3 | WeLiveSecurity

Figure3

Figure 3: Visualization of the many virtual machine handlers that complicate code analysis