Cavallaro, LorenzoSaxena, PrateekSekar, R.2009-07-292009-07-292009-07-29http://hdl.handle.net/2003/2628510.17877/DE290R-2933en004On the Limits of Information Flow Techniques for Malware Analysis and Containmentconference contribution