Greg Hoglund

Results: 14



#Item
1Malware Dynamic Analysis Part 3 Veronica Kovah vkovah.ost at gmail  All materials is licensed under a Creative

Malware Dynamic Analysis Part 3 Veronica Kovah vkovah.ost at gmail All materials is licensed under a Creative

Add to Reading List

Source URL: opensecuritytraining.info

Language: English - Date: 2015-10-04 21:23:23
2“Shadow Walker” — Raising The Bar For Rootkit Detection Last year at Black Hat, we introduced the rootkit FU. FU took an unprecented approach to hiding not previously seen before in a Windows rootkit. Rather than p

“Shadow Walker” — Raising The Bar For Rootkit Detection Last year at Black Hat, we introduced the rootkit FU. FU took an unprecented approach to hiding not previously seen before in a Windows rootkit. Rather than p

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
3Runtime Decompilation The ‘GreyBox’ process for Exploiting Software By: Greg Hoglund

Runtime Decompilation The ‘GreyBox’ process for Exploiting Software By: Greg Hoglund

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
4R_: The Exponential Growth of Rootkit Techniques by Jamie Butler Bill Arbaugh Nick Petroni

R_: The Exponential Growth of Rootkit Techniques by Jamie Butler Bill Arbaugh Nick Petroni

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
5Addressing Complete Security to Save Money Security Horizon, Inc. http://www.securityhorizon.com By Russ Rogers

Addressing Complete Security to Save Money Security Horizon, Inc. http://www.securityhorizon.com By Russ Rogers

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:21
6r7jk.ps

r7jk.ps

Add to Reading List

Source URL: www.swsec.com

Language: English - Date: 2010-09-21 12:05:16
7Exploiting Parsing Bugs Greg Hoglund Cenzic, Inc. What is parsing?

Exploiting Parsing Bugs Greg Hoglund Cenzic, Inc. What is parsing?

Add to Reading List

Source URL: www.blackhat.com

- Date: 2014-12-16 19:06:21
    8BLACK HAT USA 2009 ONSITE REGISTRATION FORM INSTRUCTIONS Use one form per registrant. Please forward the completed forms prior to your arrival to the event. The only methods of payment accepted are credit card, money ord

    BLACK HAT USA 2009 ONSITE REGISTRATION FORM INSTRUCTIONS Use one form per registrant. Please forward the completed forms prior to your arrival to the event. The only methods of payment accepted are credit card, money ord

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:13
    9The Rootkit Primer Fear and Loathing in Sonoma Bill Blunden Below Gotham Labs

    The Rootkit Primer Fear and Loathing in Sonoma Bill Blunden Below Gotham Labs

    Add to Reading List

    Source URL: www.belowgotham.com

    Language: English - Date: 2009-04-09 11:20:03
    10Guest Editors’ Introduction  Securing Online Games Safeguarding the Future of Software Security

    Guest Editors’ Introduction Securing Online Games Safeguarding the Future of Software Security

    Add to Reading List

    Source URL: www.cigital.com

    Language: English - Date: 2013-11-26 20:39:27