response, as it provides critically important capabilities for detecting sophisticated malware
attacks, including memory-only malware components. In this paper, we concentrate on
improving analysis of API hooks, a technique commonly employed by malware to hijack the
execution flow of legitimate functions. These hooks allow the malware to gain control at
critical times and to exercise complete control over function arguments and return values …