Shellcode

Results: 175



#Item
71Machine code / X86 instructions / Shellcode / Software bugs / X86 architecture / Buffer overflow / Self-modifying code / CPUID / NOP / Computer architecture / Computing / Cyberwarfare

Using Instruction Sequence Abstraction for Shellcode Detection and Attribution Ziming Zhao and Gail-Joon Ahn Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University, Tempe, AZ 85281, USA

Add to Reading List

Source URL: www.public.asu.edu

Language: English - Date: 2013-07-11 17:06:53
72Software / Stuxnet / Shellcode / Windows NT 4.0 / Microsoft Windows / Cyberwarfare / System software / Duqu

Note: Because Type 1 font programs were originally produced and were carefully checked only within Adobe Systems, Type 1 BuildChar was designed with the expectation that only errorfree Type 1 font programs would be prese

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2013-03-19 04:58:41
73Software bugs / Shellcode / Data types / Type theory / Heap spraying / Buffer overflow / PaX / Address space layout randomization / Stack buffer overflow / Computing / Software engineering / Computer security

Heap Taichi: Exploiting Memory Allocation Granularity in Heap-Spraying Attacks Yu Ding1,2 , Tao Wei1,2∗, TieLei Wang1,2 , Zhenkai Liang3 , Wei Zou1,2 , Institute of Computer Science and Technology, Peking University Ke

Add to Reading List

Source URL: lenx.100871.net

Language: English - Date: 2012-05-09 22:08:36
74Antivirus software / Shellcode / Privilege escalation / INCA Internet / Linux kernel / Architecture of Windows NT / Windows Registry / Zero-day attack / Ioctl / Computer security / System software / Software

Anti-Virus Software 0Day Party MJ0011 Agenda

Add to Reading List

Source URL: powerofcommunity.net

Language: English - Date: 2010-12-06 04:41:42
75Address space layout randomization / Software quality / Computing / Systems engineering / JIT spraying / Software bugs / Shellcode / Buffer overflow

Chen XiaoBo Defeating windows 7 browser

Add to Reading List

Source URL: powerofcommunity.net

Language: English - Date: 2010-11-18 10:16:18
76Spamming / Cyberwarfare / Botnets / IRCd / Malware / Internet Relay Chat / Local Security Authority Subsystem Service / Shellcode / Video game bot / Computing / Computer network security / Multi-agent systems

Dependable Distributed Systems Tracking Botnets http://honeynet.org/papers/bots Thorsten Holz

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-07 19:38:54
77Computer network security / Mac OS X / Shellcode / Software testing / Mac OS X Snow Leopard / Firewall / Mac OS X Leopard / Sandbox / Exploit / System software / Computer security / Software

Hacking Macs for Fun and Profit Dino A. Dai Zovi Offensive Security Researcher http://trailofbits.com http://theta44.org

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2009-03-25 18:45:02
78Computing / NOP / Computer architecture / Systems engineering / Shellcode / Machine code / Address space layout randomization

Heap Taichi: Exploiting Memory Allocation Granularity in Heap-Spraying Attacks Yu Ding1, Tao Wei1, Tielei Wang1, Zhenkai Liang2, Wei Zou1 1Peking University, 2National University of Singapore

Add to Reading List

Source URL: powerofcommunity.net

Language: English - Date: 2010-12-05 20:13:17
79Botnet / Peking University / Computing / Computer network security / Malware / Shellcode

PDF Document

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2012-12-11 01:17:01
80Computing / Antivirus software / Client honeypot / Malware / HoneyMonkey / Shellcode / Honeypot / Microsoft Security Essentials / Threat / Computer network security / Cyberwarfare / Computer security

WebPatrol: Automated Collection and Replay of Web-based Malware Scenarios Kevin Zhijie Chen Guofei Gu

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2012-12-11 01:17:01
UPDATE