Polymorphic code

Results: 35



#Item
21Malware / Heuristic analysis / Polymorphic code / Antivirus software / Computer virus / Virus

CHAPTER 1 INTRODUCTION 1.1

Add to Reading List

Source URL: eprints.utm.my

Language: English - Date: 2012-07-03 03:57:07
22Malware / Search algorithms / Cryptography / Polymorphic code / Obfuscation / Rootkit / Obfuscated code / Hash table / Computer virus / Computer programming / Computing / Software engineering

Impeding Malware Analysis Using Conditional Code Obfuscation Monirul Sharif1 1 Andrea Lanzi2

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2008-01-28 08:33:00
23Software / Computer virus / Heuristic analysis / Heuristic / Dropper / Polymorphic code / Rootkit / Virus / Computer worm / System software / Malware / Antivirus software

:: Heuristic Analysis— Detecting Unknown Viruses Anti-virus does much more than reactively detect known viruses; it proactively scans for unknown ones too.

Add to Reading List

Source URL: www.eset.com

Language: English - Date: 2011-02-28 17:14:03
24Computer viruses / Computer network security / Antivirus software / Macro virus / Melissa / Computer worm / Happy99 / Polymorphic code / Linux malware / System software / Malware / Software

The Evolving Virus Threat Mr. Carey Nachenberg Chief Researcher, Symantec Corporation Over the past twenty years, computer viruses have evolved from simple computer programs capable of spreading on a single PC to complex

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
25Malware / Cyberwarfare / Rootkit / Computer virus / Polymorphic code / Spyware / Symantec / Avira / Norton AntiVirus / System software / Computer security / Antivirus software

11310863_HTTST_tb.qxd[removed]:03 PM

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2006-10-31 19:47:03
26Shellcode / Polymorphic code / Self-modifying code / MOV / Metasploit Project / Buffer overflow / Hacking: The Art of Exploitation Second Edition / Cyberwarfare / Computer security / Software

PDF Document

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2009-10-28 10:35:48
27Shellcode / Malware / Software bugs / Hooking / Polymorphic code / Windows API / Code injection / Exploit / Application programming interface / Cyberwarfare / Computer security / Computing

Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow Fabian Monrose

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2012-08-20 18:04:07
28Shellcode / Software bugs / Buffer overflow / Polymorphic code / Arbitrary code execution / Self-modifying code / Computer virus / Address space layout randomization / Metasploit Project / Computing / Computer security / Cyberwarfare

J Comput Virol[removed]:257–274 DOI[removed]s11416[removed]z O R I G I NA L PA P E R Network-level polymorphic shellcode detection using emulation

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2009-10-19 10:25:58
29Software bugs / Buffer overflow / Shellcode / Machine code / NOP / Data structure alignment / Memory address / Instruction set / Forth / Computing / Software engineering / Computer architecture

STRIDE: POLYMORPHIC SLED DETECTION THROUGH INSTRUCTION SEQUENCE ANALYSIS P. Akritidis1, E. P. Markatos1, M. Polychronakis1, and K. Anagnostakis2 1

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2009-10-19 10:45:13
30Software / Computer viruses / Heuristic analysis / Michelangelo / Macro virus / Virus Bulletin / Polymorphic code / Simile / Malware / System software / Antivirus software

Int. J. Open Problems Compt. Math., Vol. 1, No. 2, September[removed]Computer Virus Strategies and Detection

Add to Reading List

Source URL: www.emis.de

Language: English - Date: 2010-07-18 14:17:42
UPDATE