Polymorphic code

Results: 35



#Item
11Software testing / Malware / Computer network security / Sandbox / Computer virus / Computer security / Polymorphic code / System software / Software / Antivirus software

White Paper Build a Better Sandbox. Create a working strategy for comprehensive malware protection.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-10-01 13:49:51
12Shellcode / Polymorphic code / Self-modifying code / MOV / Metasploit Project / Buffer overflow / Hacking: The Art of Exploitation Second Edition / Cyberwarfare / Computer security / Software

PDF Document

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-06-18 08:37:26
13Polymorphic code / Antivirus software / Virus Bulletin / Polymorphic engine / Dark Avenger / Viral disease / Virus / Simile / Metamorphic code / Malware / System software / Computer viruses

VIRUS BULLETIN CONFERENCE, SEPTEMBER 2001 • 123 HUNTING FOR METAMORPHIC Péter Ször and Peter Ferrie Symantec Corporation, 2500 Broadway, Suite 200, Santa Monica, CA[removed], USA Tel + [removed] • Fax +1 31

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 16:13:20
14Simile / Metamorphic code / Oligomorphic code / Antivirus software / Polymorphic engine / Polymorphic code / Malware / System software / Computer viruses

4 • VIRUS BULLETIN MAY[removed]VIRUS ANALYSIS Striking Similarities placed in another section. This is to conceal further the

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 16:43:27
15Cyberwarfare / Computer security / Polymorphic code / Rootkit / Computer virus / Shellcode / Code injection / VirusTotal.com / DLL injection / System software / Malware / Antivirus software

Bypass Antivirus Dynamic Analysis Limitations of the AV model and how to exploit them Date of writing: [removed]Author: Emeric Nasi – emeric.nasi[at]sevagas.com Website: http://www.sevagas.com/

Add to Reading List

Source URL: www.gironsec.com

Language: English - Date: 2014-08-25 06:22:22
16Polymorphic code / Substitution cipher / Computer virus / Cipher / A5/1 / Running key cipher / Cryptography / Stream ciphers / Ciphertext

PRINCIPLES AND PRACTISE OF X-RAYING PERRIOT & FERRIE PRINCIPLES AND PRACTISE OF X-RA YING X-RAYING

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 16:43:27
17Malware / Polymorphic code / Computer virus / Simile / C / Pointer / Subroutine / Computing / Computer programming / Software engineering

VIRUS BULLETIN www.virusbtn.com VIRUS ANALYSIS 2 IT’S ZELL(D)OME THE ONE YOU EXPECT Peter Ferrie and Heather Shannon

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 16:13:20
18Antivirus software / Computer virus / Procedural programming languages / Application programming interface / Polymorphic code / Windows API / Portable Executable / C / Heuristic analysis / System software / Software / Computing

PDF Document

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:57:18
19Markov processes / Estimation theory / Bioinformatics / Markov chain / Hidden Markov model / Markov property / Expectation–maximization algorithm / Mixture model / Maximum likelihood / Statistics / Markov models / Probability and statistics

Theoretical background for WinBUGS code HMM.odc Estimation of infection and recovery rates for highly polymorphic parasites when detectability is imperfect, using hidden Markov models Tom Smith & Penelope Vounatsou

Add to Reading List

Source URL: www.swisstph.ch

Language: English - Date: 2013-09-12 05:44:20
20Software / Malware / Metamorphic code / Polymorphic code / Virus / Kaspersky Lab / System software / Antivirus software / Computer viruses

vii TABLE OF CONTENTS CHAPTER

Add to Reading List

Source URL: eprints.utm.my

Language: English - Date: 2012-07-03 03:57:12
UPDATE