Identifying Libraries and Network Connections in Malicious Binaries