Malware analysis

Results: 349



#Item
181Cyberwarfare / Stack buffer overflow / Buffer overflow / Uncontrolled format string / Vulnerability / Valgrind / C / Malware / Pointer / Computing / Software bugs / Software engineering

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome [removed] Carnegie Mellon University Abstract

Add to Reading List

Source URL: www.valgrind.org

Language: English - Date: 2006-08-12 00:33:35
182Microsoft Windows / Shellcode / Blaster / Welchia / Windows XP / Windows Registry / Svchost.exe / Mydoom / Windows / Malware / System software / Computer worms

VIRUS BULLETIN www.virusbtn.com VIRUS ANALYSIS 1 THE WORMPIRE STRIKES BACK Peter Ferrie, Frédéric Perriot Symantec Security Response, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 16:13:20
183Computer file formats / Antivirus software / COM file / Computer virus / Virtual address space / Dynamic-link library / Portable Executable / Relocation / UTF-8 / Computing / System software / Software

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS DOIN’ THE EAGLE ROCK... AGAIN! Peter Ferrie

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2013-11-01 15:36:16
184Batch file / Virus / Zarch / Malware / Computer viruses / Jerusalem / Simile / Software / System software / Computing

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS 2 LIKE A BAT OUT OF HELL %RANDOM TIME%

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2012-06-01 21:57:47
185Niels Provos / JavaScript / URL redirection / Client honeypot / Google Chrome / Software / Computing / Malware

The Ghost In The Browser Analysis of Web-based Malware Niels Provos Dean McNamee Panayiotis Mavrommatis Ke Wang

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2007-06-27 02:56:22
186Computing / 4K / COM file / Malware / AI / Westwood / Jerusalem / System software / Software / Computer virus

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS 2 SURF’S UP Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2013-02-02 01:00:00
187Antivirus software / Virus / Simile / Cleevix / Malware / System software / Computer virus

4 • VIRUS BULLETIN SEPTEMBER[removed]VIRUS ANALYSIS Attack of the Clones Peter Ferrie Symantec Security Response, Australia

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 16:13:20
188Software / COM file / Pointer / Stack / Assembly languages / Computing / Computer virus / System software

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS SO, ENTER STAGE RIGHT Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2012-07-01 12:14:16
189Central processing unit / MOV / Computer virus / FLAGS register / Virus / Parity flag / TEST / CPUID / Computer architecture / X86 instructions / X86 architecture

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS 1 ‘LAHF’ING ALL THE WAY Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2012-10-05 15:57:42
190C++ / Data types / Cross-platform software / Method / Type theory / C++ classes / Constructor / Return statement / C / Computing / Software engineering / Computer programming

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS $= $$$_+$$+$$__+_$+$$_$+$$$_+$$_$

Add to Reading List

Source URL: pferrie2.tripod.com

Language: English - Date: 2011-03-01 20:03:06
UPDATE