Back to Results
First PageMeta Content
Cyberwarfare / Computer security / Polymorphic code / Rootkit / Computer virus / Shellcode / Code injection / VirusTotal.com / DLL injection / System software / Malware / Antivirus software


Bypass Antivirus Dynamic Analysis Limitations of the AV model and how to exploit them Date of writing: [removed]Author: Emeric Nasi – emeric.nasi[at]sevagas.com Website: http://www.sevagas.com/
Add to Reading List

Document Date: 2014-08-25 06:22:22


Open Document

File Size: 993,98 KB

Share Result on Facebook

Company

Creative Commons / /

IndustryTerm

reverse engineering tools / antivirus emulation/sandboxing systems / online scanning / /

OperatingSystem

Windows Vista / Microsoft Windows / /

Organization

Denial of Service / /

/

Product

The code injection method Code injection / /

ProgrammingLanguage

C / /

Technology

encryption / Code encryption / AV / firewall / virtual memory / generally done using encryption / /

URL

http /

SocialTag