Outline-Strategiesadoptedtoachieveself-Mutationandcodeinsertion-Challengesforthedetection-Unveilingmaliciouscode-Codenormalization-Codecomparison-Prototypeimplementation-Experimentalresults-Summaryand published presentations and documents on DocSlides.