Evaluation Models for the Resilience and Stealth of Software Protections and Malware