Back to Results
First PageMeta Content
Malware / Debuggers / Computer security / Control flow / Hooking / DLL injection / Rootkit / Dynamic-link library / OllyDbg / Computing / Software / System software


Detecting “Certified Pre-owned” Software Tyler Shields, Veracode Chris Wysopal, Veracode March 25, 2009 Introduction
Add to Reading List

Document Date: 2014-12-16 19:06:30


Open Document

File Size: 111,34 KB

Share Result on Facebook

Company

Microsoft / /

IndustryTerm

rootkit technologies / system administration tools / compiled software / cryptographic algorithm / development tool chain / open source software / resultant software / malicious software / subverted development tool chain / compromised distribution site / affected software / legitimate software / /

OperatingSystem

UNIX / Microsoft Windows / Windows NT / DOS / Linux / /

Person

Chris Wysopal / Ken Thompson / /

Position

system administrator / malicious actor / reverse engineer / /

Product

IAT/Inline Injection / Windows DLL Injection DLL Injection / /

Technology

operating system / Linux / UNIX / API / cryptographic algorithm / /

SocialTag