Graph Based Analysis Technique for Identification of Key Functionalities in Malicious IoT Binaries | IEEE Conference Publication | IEEE Xplore