Here are the security research articles associated with our Reverse Engineering and Malware Analysis trainings