Polymorphic code

Results: 35



#Item
1An Empirical Study of Real-world Polymorphic Code Injection Attacks Michalis Polychronakis∗ Kostas G. Anagnostakis†  Abstract

An Empirical Study of Real-world Polymorphic Code Injection Attacks Michalis Polychronakis∗ Kostas G. Anagnostakis† Abstract

Add to Reading List

Source URL: www.ics.forth.gr

- Date: 2012-03-22 09:28:00
    2BioZoom  EMERGING TOOLS FOR RNA STRUCTURE ANALYSIS IN POLYMORPHIC DATA RADHAKRISHNAN SABARINATHAN 1,2, STEFAN E SEEMANN 2 AND JAN GORODKIN 2

    BioZoom EMERGING TOOLS FOR RNA STRUCTURE ANALYSIS IN POLYMORPHIC DATA RADHAKRISHNAN SABARINATHAN 1,2, STEFAN E SEEMANN 2 AND JAN GORODKIN 2

    Add to Reading List

    Source URL: www.biokemi.org

    Language: English - Date: 2015-06-21 12:57:41
    3Code reuse through polymorphic variants∗ Jacques Garrigue November 8, 2000 Abstract Their support for code reuse has made object-oriented languages popular. However,

    Code reuse through polymorphic variants∗ Jacques Garrigue November 8, 2000 Abstract Their support for code reuse has made object-oriented languages popular. However,

    Add to Reading List

    Source URL: www.math.nagoya-u.ac.jp

    Language: English - Date: 2005-02-23 20:45:34
    4Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow  Fabian Monrose

    Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow Fabian Monrose

    Add to Reading List

    Source URL: wwwx.cs.unc.edu

    Language: English - Date: 2014-09-05 15:38:44
    5State of New Mexico Statewide Architectural Configuration Requirements Title: Virus and Malicious Code Standard S-STD006.001 Effective Date: April 7, 2005 1.

    State of New Mexico Statewide Architectural Configuration Requirements Title: Virus and Malicious Code Standard S-STD006.001 Effective Date: April 7, 2005 1.

    Add to Reading List

    Source URL: www.doit.state.nm.us

    Language: English - Date: 2013-09-24 10:13:24
    6Analyzing Network Traffic To Detect Self-Decrypting ∗ Exploit Code Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer Cyber Defense Laboratory, Computer Science Department North Carolina State Universit

    Analyzing Network Traffic To Detect Self-Decrypting ∗ Exploit Code Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer Cyber Defense Laboratory, Computer Science Department North Carolina State Universit

    Add to Reading List

    Source URL: discovery.csc.ncsu.edu

    Language: English - Date: 2011-11-09 13:26:00
    7Real-world Polymorphic Attack Detection Michalis Polychronakis,1 Kostas G. Anagnostakis,2 Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hellas, {mikepo, markatos}@ics.fo

    Real-world Polymorphic Attack Detection Michalis Polychronakis,1 Kostas G. Anagnostakis,2 Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hellas, {mikepo, markatos}@ics.fo

    Add to Reading List

    Source URL: www.ics.forth.gr

    Language: English - Date: 2012-03-22 09:28:01
    8Network-Level Polymorphic Shellcode Detection Using Emulation Michalis Polychronakis1 , Kostas G. Anagnostakis2 , and Evangelos P. Markatos1 1  Institute of Computer Science, Foundation for Research & Technology – Hell

    Network-Level Polymorphic Shellcode Detection Using Emulation Michalis Polychronakis1 , Kostas G. Anagnostakis2 , and Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hell

    Add to Reading List

    Source URL: www.fp6-noah.org

    Language: English - Date: 2006-05-02 06:32:56
    9Defending against Polymorphic Attacks: Recent Results and Open Questions Michalis Polychronakis

    Defending against Polymorphic Attacks: Recent Results and Open Questions Michalis Polychronakis

    Add to Reading List

    Source URL: www.fp6-noah.org

    Language: English - Date: 2006-06-21 10:18:46
    10A taxonomy of self-modifying code for obfuscation Nikos Mavrogiannopoulosa , Nessim Kisserlia , Bart Preneela a Katholieke Universiteit Leuven ESAT/SCD/COSIC – IBBT

    A taxonomy of self-modifying code for obfuscation Nikos Mavrogiannopoulosa , Nessim Kisserlia , Bart Preneela a Katholieke Universiteit Leuven ESAT/SCD/COSIC – IBBT

    Add to Reading List

    Source URL: www.cosic.esat.kuleuven.be

    Language: English