Return to Article Details De-Obfuscating Emerging Malware Threats Using Reverse Engineering Techniques