Shellcode

Results: 175



#Item
1Network-Level Polymorphic Shellcode Detection Using Emulation Michalis Polychronakis1 , Kostas G. Anagnostakis2 , and Evangelos P. Markatos1 1  Institute of Computer Science, Foundation for Research & Technology – Hell

Network-Level Polymorphic Shellcode Detection Using Emulation Michalis Polychronakis1 , Kostas G. Anagnostakis2 , and Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hell

Add to Reading List

Source URL: www.ics.forth.gr

- Date: 2012-03-22 09:28:01
    2ShellNoob Because writing shellcode is fun, but sometimes painful Black Hat USA Arsenal 2013

    ShellNoob Because writing shellcode is fun, but sometimes painful Black Hat USA Arsenal 2013

    Add to Reading List

    Source URL: media.blackhat.com

    - Date: 2013-07-31 03:51:50
      3http://www.nologin.org  Understanding Windows Shellcode skape

      http://www.nologin.org Understanding Windows Shellcode skape

      Add to Reading List

      Source URL: hick.org

      - Date: 2007-08-26 07:19:02
        4Look Mom, I don’t use Shellcode Browser Exploitation Case Study for Internet Explorer 11 Moritz Jodeit (@moritzj)  Agenda

        Look Mom, I don’t use Shellcode Browser Exploitation Case Study for Internet Explorer 11 Moritz Jodeit (@moritzj) Agenda

        Add to Reading List

        Source URL: www.syscan360.org

        - Date: 2016-12-04 21:58:42
          5Q: Exploit Hardening Made Easy  Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

          Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

          Add to Reading List

          Source URL: users.ece.cmu.edu

          Language: English - Date: 2014-05-29 15:38:01
          6Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

          Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

          Add to Reading List

          Source URL: css.csail.mit.edu

          Language: English - Date: 2016-01-29 11:50:05
          7doi:The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

          doi:The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

          Add to Reading List

          Source URL: users.ece.cmu.edu

          Language: English - Date: 2014-05-29 15:38:01
          8ANTI-INCIDENT RESPONSE Nick Harbour, Principal Consultant © 2012 CrowdStrike, Inc. All rights reserved. Nick Harbour - Bio • 14 Years of Intrusion Analysis

          ANTI-INCIDENT RESPONSE Nick Harbour, Principal Consultant © 2012 CrowdStrike, Inc. All rights reserved. Nick Harbour - Bio • 14 Years of Intrusion Analysis

          Add to Reading List

          Source URL: digital-forensics.sans.org

          Language: English - Date: 2012-06-29 08:39:58
          9Antiy Labs  The Latest APT Attack by Exploiting CVE2012-0158 Vulnerability  Antiy Labs

          Antiy Labs The Latest APT Attack by Exploiting CVE2012-0158 Vulnerability Antiy Labs

          Add to Reading List

          Source URL: www.antiy.net

          Language: English - Date: 2013-05-15 23:32:53