<--- Back to Details
First PageDocument Content
Espionage / Backdoor / Rootkit / Code injection / Veracode / Loadable kernel module / Hooking / Eval / Self-modifying code / Malware / System software / Cyberwarfare
Date: 2015-05-28 15:51:26
Espionage
Backdoor
Rootkit
Code injection
Veracode
Loadable kernel module
Hooking
Eval
Self-modifying code
Malware
System software
Cyberwarfare

Add to Reading List

Source URL: www.blackhat.com

Download Document from Source Website

File Size: 211,25 KB

Share Document on Facebook

Similar Documents

ARMlock: Hardware-based Fault Isolation for ARM Yajin Zhou, Xiaoguang Wang, Yue Chen, and Zhi Wang North Carolina State University Xi’an Jiaotong University Florida State University

ARMlock: Hardware-based Fault Isolation for ARM Yajin Zhou, Xiaoguang Wang, Yue Chen, and Zhi Wang North Carolina State University Xi’an Jiaotong University Florida State University

DocID: 1roQV - View Document

IDRISI : A COLLECTIVE GEOGRAPHIC ANALYSIS SYSTEM PROJECT  J. Ronald Eastman Stacy M. Warren Graduate School of Geography Clark University

IDRISI : A COLLECTIVE GEOGRAPHIC ANALYSIS SYSTEM PROJECT J. Ronald Eastman Stacy M. Warren Graduate School of Geography Clark University

DocID: 1rnBR - View Document

Linux Kernel Exploitation Earning Its Pwnie a Vuln at a Time Jon Oberheide CTO, Scio Security  This document is confidential and is intended solely for use by its original recipient for informational

Linux Kernel Exploitation Earning Its Pwnie a Vuln at a Time Jon Oberheide CTO, Scio Security This document is confidential and is intended solely for use by its original recipient for informational

DocID: 1r9xW - View Document

Exploiting heterogeneous parallelism with the Heterogeneous Programming Library

Exploiting heterogeneous parallelism with the Heterogeneous Programming Library

DocID: 1qQZ0 - View Document

Microsoft Worddoc

Microsoft Worddoc

DocID: 1qNRH - View Document