<--- Back to Details
First PageDocument Content
Antivirus software / Computer virus / Procedural programming languages / Application programming interface / Polymorphic code / Windows API / Portable Executable / C / Heuristic analysis / System software / Software / Computing
Date: 2013-11-21 18:57:18
Antivirus software
Computer virus
Procedural programming languages
Application programming interface
Polymorphic code
Windows API
Portable Executable
C
Heuristic analysis
System software
Software
Computing

Add to Reading List

Source URL: www.nict.go.jp

Download Document from Source Website

File Size: 1,32 MB

Share Document on Facebook

Similar Documents

An Empirical Study of Real-world Polymorphic Code Injection Attacks Michalis Polychronakis∗ Kostas G. Anagnostakis† Abstract

DocID: 1tpH7 - View Document

Molecular biology / Gene expression / Genetics / DNA / RNA / Single-nucleotide polymorphism / Nucleic acid sequence / Base pair / Non-coding RNA / Point mutation / Genetic code / Human genome

BioZoom EMERGING TOOLS FOR RNA STRUCTURE ANALYSIS IN POLYMORPHIC DATA RADHAKRISHNAN SABARINATHAN 1,2, STEFAN E SEEMANN 2 AND JAN GORODKIN 2

DocID: 1oLzH - View Document

Software engineering / Computer programming / Declarative programming / Functional programming / Data types / Type theory / Eval / Standard ML / Anonymous function / HindleyMilner type system / OCaml / Polymorphism

Code reuse through polymorphic variants∗ Jacques Garrigue November 8, 2000 Abstract Their support for code reuse has made object-oriented languages popular. However,

DocID: 1m97T - View Document

Shellcode / Malware / Software bugs / Hooking / Polymorphic code / Windows API / Code injection / Exploit / Application programming interface / Cyberwarfare / Computer security / Computing

Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow Fabian Monrose

DocID: 1gi1i - View Document

Antivirus software / Computer network security / Computer viruses / Macro virus / Polymorphic code / Hare / Spyware / Avast! / BitDefender / System software / Malware / Software

State of New Mexico Statewide Architectural Configuration Requirements Title: Virus and Malicious Code Standard S-STD006.001 Effective Date: April 7, 2005 1.

DocID: 19nIn - View Document