<--- Back to Details
First PageDocument Content
Shellcode / Polymorphic code / Self-modifying code / MOV / Metasploit Project / Buffer overflow / Hacking: The Art of Exploitation Second Edition / Cyberwarfare / Computer security / Software
Date: 2007-06-18 08:37:26
Shellcode
Polymorphic code
Self-modifying code
MOV
Metasploit Project
Buffer overflow
Hacking: The Art of Exploitation Second Edition
Cyberwarfare
Computer security
Software

Add to Reading List

Source URL: www.fp6-noah.org

Download Document from Source Website

File Size: 338,35 KB

Share Document on Facebook

Similar Documents

An Empirical Study of Real-world Polymorphic Code Injection Attacks Michalis Polychronakis∗ Kostas G. Anagnostakis† Abstract

DocID: 1tpH7 - View Document

Molecular biology / Gene expression / Genetics / DNA / RNA / Single-nucleotide polymorphism / Nucleic acid sequence / Base pair / Non-coding RNA / Point mutation / Genetic code / Human genome

BioZoom EMERGING TOOLS FOR RNA STRUCTURE ANALYSIS IN POLYMORPHIC DATA RADHAKRISHNAN SABARINATHAN 1,2, STEFAN E SEEMANN 2 AND JAN GORODKIN 2

DocID: 1oLzH - View Document

Software engineering / Computer programming / Declarative programming / Functional programming / Data types / Type theory / Eval / Standard ML / Anonymous function / HindleyMilner type system / OCaml / Polymorphism

Code reuse through polymorphic variants∗ Jacques Garrigue November 8, 2000 Abstract Their support for code reuse has made object-oriented languages popular. However,

DocID: 1m97T - View Document

Shellcode / Malware / Software bugs / Hooking / Polymorphic code / Windows API / Code injection / Exploit / Application programming interface / Cyberwarfare / Computer security / Computing

Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow Fabian Monrose

DocID: 1gi1i - View Document

Antivirus software / Computer network security / Computer viruses / Macro virus / Polymorphic code / Hare / Spyware / Avast! / BitDefender / System software / Malware / Software

State of New Mexico Statewide Architectural Configuration Requirements Title: Virus and Malicious Code Standard S-STD006.001 Effective Date: April 7, 2005 1.

DocID: 19nIn - View Document