Polymorphic code

Results: 35



#Item
1

An Empirical Study of Real-world Polymorphic Code Injection Attacks Michalis Polychronakis∗ Kostas G. Anagnostakis† Abstract

Add to Reading List

Source URL: www.ics.forth.gr

- Date: 2012-03-22 09:28:00
    2Molecular biology / Gene expression / Genetics / DNA / RNA / Single-nucleotide polymorphism / Nucleic acid sequence / Base pair / Non-coding RNA / Point mutation / Genetic code / Human genome

    BioZoom EMERGING TOOLS FOR RNA STRUCTURE ANALYSIS IN POLYMORPHIC DATA RADHAKRISHNAN SABARINATHAN 1,2, STEFAN E SEEMANN 2 AND JAN GORODKIN 2

    Add to Reading List

    Source URL: www.biokemi.org

    Language: English - Date: 2015-06-21 12:57:41
    3Software engineering / Computer programming / Declarative programming / Functional programming / Data types / Type theory / Eval / Standard ML / Anonymous function / HindleyMilner type system / OCaml / Polymorphism

    Code reuse through polymorphic variants∗ Jacques Garrigue November 8, 2000 Abstract Their support for code reuse has made object-oriented languages popular. However,

    Add to Reading List

    Source URL: www.math.nagoya-u.ac.jp

    Language: English - Date: 2005-02-23 20:45:34
    4Shellcode / Malware / Software bugs / Hooking / Polymorphic code / Windows API / Code injection / Exploit / Application programming interface / Cyberwarfare / Computer security / Computing

    Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow Fabian Monrose

    Add to Reading List

    Source URL: wwwx.cs.unc.edu

    Language: English - Date: 2014-09-05 15:38:44
    5Antivirus software / Computer network security / Computer viruses / Macro virus / Polymorphic code / Hare / Spyware / Avast! / BitDefender / System software / Malware / Software

    State of New Mexico Statewide Architectural Configuration Requirements Title: Virus and Malicious Code Standard S-STD006.001 Effective Date: April 7, 2005 1.

    Add to Reading List

    Source URL: www.doit.state.nm.us

    Language: English - Date: 2013-09-24 10:13:24
    6Polymorphic code / Buffer overflow / Assembly languages / Self-modifying code / Computer programming / Shellcode / Polymorphic engine / Addressing mode / Malware / Computing / Software engineering

    Analyzing Network Traffic To Detect Self-Decrypting ∗ Exploit Code Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer Cyber Defense Laboratory, Computer Science Department North Carolina State Universit

    Add to Reading List

    Source URL: discovery.csc.ncsu.edu

    Language: English - Date: 2011-11-09 13:26:00
    7Computer network security / Shellcode / Software bugs / Polymorphic code / Buffer overflow / Metasploit Project / Exploit / Conficker / Computer virus / Cyberwarfare / Computer security / Computing

    Real-world Polymorphic Attack Detection Michalis Polychronakis,1 Kostas G. Anagnostakis,2 Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hellas, {mikepo, markatos}@ics.fo

    Add to Reading List

    Source URL: www.ics.forth.gr

    Language: English - Date: 2012-03-22 09:28:01
    8Malware / Shellcode / Software bugs / Polymorphic code / Buffer overflow / Arbitrary code execution / Self-modifying code / Metasploit Project / Forth / Cyberwarfare / Computer security / Computing

    Network-Level Polymorphic Shellcode Detection Using Emulation Michalis Polychronakis1 , Kostas G. Anagnostakis2 , and Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hell

    Add to Reading List

    Source URL: www.fp6-noah.org

    Language: English - Date: 2006-05-02 06:32:56
    9Shellcode / Î / Metasploit Project / Exploit / Inverted breve / Romanian language / NOP / Self-modifying code / Computer security / Cyberwarfare / Languages of Europe

    Defending against Polymorphic Attacks: Recent Results and Open Questions Michalis Polychronakis

    Add to Reading List

    Source URL: www.fp6-noah.org

    Language: English - Date: 2006-06-21 10:18:46
    10Programming language implementation / Source code / Obfuscation / Debugging / Anti-patterns / Polymorphic code / Self-modifying code / Interpreter / Breakpoint / Computer programming / Software engineering / Computing

    A taxonomy of self-modifying code for obfuscation Nikos Mavrogiannopoulosa , Nessim Kisserlia , Bart Preneela a Katholieke Universiteit Leuven ESAT/SCD/COSIC – IBBT

    Add to Reading List

    Source URL: www.cosic.esat.kuleuven.be

    Language: English
    UPDATE