%PDF-1.4
%
1 0 obj
<< /Subject (6th International Workshop on Visualization for Cyber Security 2009; 11 October, Atlantic City, New Jersey, USA; 978-1-4244-5413-6/09/$25.00 2009 IEEE) /Trapped /False /ModDate (D:20100106140008-05') /Author (Thorsten Holz Philipp Trinius) /Title (Visual Analysis of Malware Behavior Using Treemaps and Thread Graphs) /Producer (pdfTeX-1.40.9) /Creator (TeX) /CreationDate (D:20090710121950+02'00') /PTEX.Fullbanner (This is pdfTeX, Version 3.1415926-1.40.9-2.2 \(Web2C 7.5.7\) kpathsea version 3.5.7)
>>
endobj
2 0 obj
<< /Height 1002 /BitsPerComponent 8 /Subtype /Image /Length 1970 /ColorSpace /DeviceGray /Width 1002 /Filter /FlateDecode /Type /XObject
>>
stream
x! \
w
endstream
endobj
3 0 obj
<< /Length2 1522 /Length3 0 /Length 2091 /Filter /FlateDecode /Length1 816
>>
stream
xڭR{8y&mŖӦLà92C4b&9E;fޙy3eMQaSvq+
mmC%ky~u?؋&!/F1x[B <C")B!|'66xD G%m"$B(ْA!d*CÕ3@0!P, d-u (A,)B@ćafEF|BR4Y>O@6)P*?L};%d/_
4#I#"Š
X
oYw11|x+ΒD.PL.fD2YZQlLv[|2ŀ}}/2#!08^)T~_y˙ > !ᔣD" F`0-2h-j `"eR(L x bp8b/+_0@ҩ.Q%E+mC+dM!3R(sSFfC5`ȄvvCyjsHeʘs+NSX8֢uv]:J7zZj*o2n=6s`+;=2V|F{לcWFfE&`k5s>
{rLcRL6Ӑ[j*^^?ߖlq[qgtA_u߉MGk!D3{gW>\chD*8F|x&ãE-!:~G |zBm+I
rLx
sg}Bo^mگ~+^M
mit$FcAMNϝ3a}uI e6Eҕ3$S$08Рu~}}_Ly?ʌ:jWVs>!
x@iF%KC1'hW)RAPtZ60C#]2Ǿ+-uOhϡEY9~6`x+8ޖjmR̴H4S0JrCK{Juzj|m;κ&%x#Cφ5r=k"nk֫tgăO&1.)U;
vl+;S_>Zq2j5F+{K2tnz*T4kony
5s6u3xs373Y7O2xbpWNW7jIQ.+SAǶHL?,O,SK29d%;zZY1w7g\2oE52z],[!h-$]X2M.[57+MZՐƭsG:p`F2BS~<ն]+UjZfv3%(O=˼}
LQK{e3\WHgZyԬY؛sZadce^?N.)ew=u=T]֬
Pˌ!#1Rڿ^{5ldaig);I;1̺OZf6eopybZmdby `ԅu9(<~t;^9,g4C}߶Ū+Nvԑ-7OTw`eI6Vtms34ro=aL
feqcOVv_p1QWEצ6RYy>=/ 0~Űb+Fd]wjOv&EAͮ/:Vꌌ:&7N/":ѮӊwJZ-|`(V&뮫EFOJSY)Ný-C}6mM}<!M~a 9
endstream
endobj
4 0 obj
<< /Filter /FlateDecode /Length 4968
>>
stream
H]۸}*w<6\:N/m6r6__ e A|\N'sQd+I"ͪb}[:әĶ