<--- Back to Details
First PageDocument Content
Computing / Computer architecture / Software / Windows NT kernel / Computing platforms / DLL injection / Windows API / Native API / Dynamic-link library / Architecture of Windows NT / Windows Registry / Microsoft Windows
Date: 2012-02-04 20:18:03
Computing
Computer architecture
Software
Windows NT kernel
Computing platforms
DLL injection
Windows API
Native API
Dynamic-link library
Architecture of Windows NT
Windows Registry
Microsoft Windows

Rethinking the Library OS from the Top Down

Add to Reading List

Source URL: www3.cs.stonybrook.edu

Download Document from Source Website

File Size: 1,90 MB

Share Document on Facebook

Similar Documents

Computing / Software / System software / Dynamic-link library / Library / DLL injection

LoadLibrary(filename)   kernel32.dll   LoadLibrary(filename)  

DocID: 1qn23 - View Document

DLL injection / CrowdStrike / Shellcode / Rootkit / Hooking / Malware

ANTI-INCIDENT RESPONSE Nick Harbour, Principal Consultant © 2012 CrowdStrike, Inc. All rights reserved. Nick Harbour - Bio • 14 Years of Intrusion Analysis

DocID: 1pAIq - View Document

Directory services / Control flow / DLL injection / Windows API / Lightweight Directory Access Protocol / Dynamic-link library / Exception handling / ASP.NET / Hooking / Windows Registry / Code injection / Active Directory

HITB Magazine Keeping Knowledge Free Volume 1, Issue 1, JanuaryCover Story

DocID: 1oo1V - View Document

Computing / Computer architecture / Software / Windows NT kernel / Computing platforms / DLL injection / Windows API / Native API / Dynamic-link library / Architecture of Windows NT / Windows Registry / Microsoft Windows

Rethinking the Library OS from the Top Down

DocID: 1mwBE - View Document

Computing / Software engineering / Computer programming / Data types / Control flow / C / DLL injection / Hooking / WindowProc / Subroutines / Callback / Typedef

MWR Labs Walkthrough Windows Kernel Exploitation 101: Exploiting CVESam Brown

DocID: 1mcuU - View Document