Back to Results
First PageMeta Content
Polymorphic code / Buffer overflow / Assembly languages / Self-modifying code / Computer programming / Shellcode / Polymorphic engine / Addressing mode / Malware / Computing / Software engineering


Analyzing Network Traffic To Detect Self-Decrypting ∗ Exploit Code Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer Cyber Defense Laboratory, Computer Science Department North Carolina State Universit
Add to Reading List

Document Date: 2011-11-09 13:26:00


Open Document

File Size: 227,28 KB

Share Result on Facebook

Company

CONCLUSIONS In / Reliable Distributed Systems / Syngress Publishing / S. Jha S. A. / Intel / Microsoft / /

Country

United States / Singapore / /

Currency

USD / /

/

Facility

Library Bitstring Heap Overflow / Computer Science Department North Carolina State University / /

IndustryTerm

detection systems / high processing / software flaws / traffic capture tool / modest additional processing / data mining methods / Internet infrastructure / software exploits / neural networks / vulnerable computer systems / data-mining / software makes / derived chain / neural network / above tools / ftp server / Internet worms / disassembly technology / detection algorithm / vulnerable systems / modest processing speed / /

OperatingSystem

XP / Windows XP / Microsoft Windows / /

Organization

National Science Foundation / U.S. Securities and Exchange Commission / North Carolina State University / Raleigh / /

Person

Morgan Kaufmann / Douglas S. Reeves / /

/

Position

General / /

Product

Windows XP / /

ProgrammingLanguage

C / /

Technology

code encryption / RAM / disassembly technology / streaming video / application protocol / UDP / SSL / exploit code encryption / encryption / neural network / HTTP / data mining / detection algorithm / /

URL

http /

SocialTag