Shellcode

Results: 175



#Item
41

PDF Document

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-11-13 11:47:12
42Network-Level Polymorphic Shellcode Detection Using Emulation Michalis Polychronakis1 , Kostas G. Anagnostakis2 , and Evangelos P. Markatos1 1  Institute of Computer Science, Foundation for Research & Technology – Hell

Network-Level Polymorphic Shellcode Detection Using Emulation Michalis Polychronakis1 , Kostas G. Anagnostakis2 , and Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hell

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-05-02 06:32:56
43

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:26
44Table of Contents Introduction ............................................................................................................. 2 Dropper ....................................................................

Table of Contents Introduction ............................................................................................................. 2 Dropper ....................................................................

Add to Reading List

Source URL: www.welivesecurity.com

Language: English - Date: 2013-05-29 11:42:06
45CIS 331 Introduction to Networks & Security Tuesday, March 25 Project 4: Application Security

CIS 331 Introduction to Networks & Security Tuesday, March 25 Project 4: Application Security

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-11-18 15:19:13
46The Holy Grail: Cisco IOS Shellcode And Exploitation Techniques Michael Lynn Internet Security Systems

The Holy Grail: Cisco IOS Shellcode And Exploitation Techniques Michael Lynn Internet Security Systems

Add to Reading List

Source URL: www.lemuria.org

Language: English - Date: 2005-07-30 04:11:12
47CIS 331 Introduction to Networks & Security Tuesday, March 31 Project 4: Application Security

CIS 331 Introduction to Networks & Security Tuesday, March 31 Project 4: Application Security

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-03-30 23:29:05
48Argos: an Emulator for Fingerprinting Zero-Day Attacks for advertised honeypots with automatic signature generation Georgios Portokalidis Asia Slowinska

Argos: an Emulator for Fingerprinting Zero-Day Attacks for advertised honeypots with automatic signature generation Georgios Portokalidis Asia Slowinska

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-04-15 13:38:13
49Buffer overflow / MOV / JMP / Computing / Shellcode / X86 instructions / Software bugs

Win32 One-Way Shellcode Building Firewall-proof shellcode Black Hat Briefing AsiaCo-founder, Security Consultant, Software

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:21
50Defending against Polymorphic Attacks: Recent Results and Open Questions Michalis Polychronakis

Defending against Polymorphic Attacks: Recent Results and Open Questions Michalis Polychronakis

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-06-21 10:18:46