not robust enough to secure the systems from getting compromised. The techniques, like
code obfuscation along with one or more zero-days, are used by malware developers for
evading the security systems. These malwares are used for large-scale attacks involving
Advanced Persistent Threats (APT), Botnets, Cryptojacking, etc. Cryptojacking poses a
severe threat to various organizations and individuals. We are summarising multiple …