Back to Results
First PageMeta Content
Malware / Shellcode / Software bugs / Polymorphic code / Buffer overflow / Arbitrary code execution / Self-modifying code / Metasploit Project / Forth / Cyberwarfare / Computer security / Computing


Network-Level Polymorphic Shellcode Detection Using Emulation Michalis Polychronakis1 , Kostas G. Anagnostakis2 , and Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hell
Add to Reading List

Document Date: 2006-05-02 06:32:56


Open Document

File Size: 117,89 KB

Share Result on Facebook

Country

Singapore / /

/

Facility

Institute of Computer Science / /

IndustryTerm

detection technology / Internet worm / neural network / virtual processor / satisfactory solution / intrusion detection systems / tamper-resistant software / detection algorithm / attack detection technology / vulnerable systems / recursive traversal algorithm / software piracy / /

Movie

At first sight / /

OperatingSystem

Windows XP / Linux / Microsoft Windows / /

Organization

Institute for Infocomm Research / Foundation for Research & Technology / Institute of Computer Science / /

/

Product

styx / /

Technology

encryption / virtual machine / 4.2 Detection Algorithm The algorithm / neural network / Linux / attack detection technology / HTTP / virtual processor / detection technology / payload encryption / application protocol / UDP / recursive traversal algorithm / detection algorithm / /

SocialTag