<--- Back to Details
First PageDocument Content
Polymorphic code / Substitution cipher / Computer virus / Cipher / A5/1 / Running key cipher / Cryptography / Stream ciphers / Ciphertext
Date: 2004-10-06 03:16:28
Polymorphic code
Substitution cipher
Computer virus
Cipher
A5/1
Running key cipher
Cryptography
Stream ciphers
Ciphertext

Add to Reading List

Source URL: pferrie.tripod.com

Download Document from Source Website

File Size: 573,66 KB

Share Document on Facebook

Similar Documents

An Empirical Study of Real-world Polymorphic Code Injection Attacks Michalis Polychronakis∗ Kostas G. Anagnostakis† Abstract

DocID: 1tpH7 - View Document

Molecular biology / Gene expression / Genetics / DNA / RNA / Single-nucleotide polymorphism / Nucleic acid sequence / Base pair / Non-coding RNA / Point mutation / Genetic code / Human genome

BioZoom EMERGING TOOLS FOR RNA STRUCTURE ANALYSIS IN POLYMORPHIC DATA RADHAKRISHNAN SABARINATHAN 1,2, STEFAN E SEEMANN 2 AND JAN GORODKIN 2

DocID: 1oLzH - View Document

Software engineering / Computer programming / Declarative programming / Functional programming / Data types / Type theory / Eval / Standard ML / Anonymous function / HindleyMilner type system / OCaml / Polymorphism

Code reuse through polymorphic variants∗ Jacques Garrigue November 8, 2000 Abstract Their support for code reuse has made object-oriented languages popular. However,

DocID: 1m97T - View Document

Shellcode / Malware / Software bugs / Hooking / Polymorphic code / Windows API / Code injection / Exploit / Application programming interface / Cyberwarfare / Computer security / Computing

Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow Fabian Monrose

DocID: 1gi1i - View Document

Antivirus software / Computer network security / Computer viruses / Macro virus / Polymorphic code / Hare / Spyware / Avast! / BitDefender / System software / Malware / Software

State of New Mexico Statewide Architectural Configuration Requirements Title: Virus and Malicious Code Standard S-STD006.001 Effective Date: April 7, 2005 1.

DocID: 19nIn - View Document