Greg Hoglund

Results: 14



#Item
1Cyberwarfare / Rootkits / Malware analysis / Malware / Keystroke logging / Greg Hoglund / The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System

Malware Dynamic Analysis Part 3 Veronica Kovah vkovah.ost at gmail All materials is licensed under a Creative

Add to Reading List

Source URL: opensecuritytraining.info

Language: English - Date: 2015-10-04 21:23:23
2Malware / Rootkits / Greg Hoglund / Computer network security / HBGary / Computer virus / Spyware / Operating system / The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System / Cyberwarfare / Computer security / System software

“Shadow Walker” — Raising The Bar For Rootkit Detection Last year at Black Hat, we introduced the rootkit FU. FU took an unprecented approach to hiding not previously seen before in a Windows rootkit. Rather than p

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
3Cyberwarfare / Software testing / Hacking / Greg Hoglund / Buffer overflow / Vulnerability / Exploit / Race condition / Software bugs / Software quality / Computing

Runtime Decompilation The ‘GreyBox’ process for Exploiting Software By: Greg Hoglund

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
4Malware / Rootkits / Computer security / Computer network security / Spyware / Greg Hoglund / Keystroke logging / Sony BMG copy protection rootkit scandal / The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System / Espionage / System software / Cyberwarfare

R_: The Exponential Growth of Rootkit Techniques by Jamie Butler Bill Arbaugh Nick Petroni

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
5Crime prevention / Information security / National security / Public safety / Greg Hoglund / Security / Data security / Computer security

Addressing Complete Security to Save Money Security Horizon, Inc. http://www.securityhorizon.com By Russ Rogers

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:21
6Software testing / Year of birth missing / Security / Gary McGraw / software security / Attack patterns / John Viega / Uncontrolled format string / Greg Hoglund / Hacking / Computer security / Cyberwarfare

r7jk.ps

Add to Reading List

Source URL: www.swsec.com

Language: English - Date: 2010-09-21 12:05:16
7

Exploiting Parsing Bugs Greg Hoglund Cenzic, Inc. What is parsing?

Add to Reading List

Source URL: www.blackhat.com

- Date: 2014-12-16 19:06:21
    8Computing / Software testing / Hacking / Data security / Hacker / Metasploit Project / Malware / Greg Hoglund / Penetration test / Computer security / Cyberwarfare / Computer network security

    BLACK HAT USA 2009 ONSITE REGISTRATION FORM INSTRUCTIONS Use one form per registrant. Please forward the completed forms prior to your arrival to the event. The only methods of payment accepted are credit card, money ord

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:13
    9Computer security / Rootkits / Greg Hoglund / Mark Russinovich / Antivirus software / The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System / Rkhunter / Cyberwarfare / System software / Malware

    The Rootkit Primer Fear and Loathing in Sonoma Bill Blunden Below Gotham Labs

    Add to Reading List

    Source URL: www.belowgotham.com

    Language: English - Date: 2009-04-09 11:20:03
    10Video game genres / Software / Digital media / Gaming / Gary McGraw / software security / Greg Hoglund / Cheating in video games / Massively multiplayer online role-playing game / Virtual economy / Competitive video gaming / Social software

    Guest Editors’ Introduction Securing Online Games Safeguarding the Future of Software Security

    Add to Reading List

    Source URL: www.cigital.com

    Language: English - Date: 2013-11-26 20:39:27
    UPDATE