![Shellcode / Software bugs / Buffer overflow / Polymorphic code / Arbitrary code execution / Self-modifying code / Computer virus / Address space layout randomization / Metasploit Project / Computing / Computer security / Cyberwarfare Shellcode / Software bugs / Buffer overflow / Polymorphic code / Arbitrary code execution / Self-modifying code / Computer virus / Address space layout randomization / Metasploit Project / Computing / Computer security / Cyberwarfare](https://www.pdfsearch.io/img/36efcca97439ec1ab90ce69355c7cf71.jpg)
| Document Date: 2009-10-19 10:25:58 Open Document File Size: 630,83 KBShare Result on Facebook
Country Greece / / / Facility E. P. Markatos Institute of Computer Science / K. G. Anagnostakis Institute / / IndustryTerm detection technology / web servers / Internet worm / neural network / virtual processor / satisfactory solution / intrusion detection systems / tamper-resistant software / emulation-based polymorphic shellcode detection algorithm / detection algorithm / attack detection technology / infamous Internet / attractive solution / vulnerable systems / recursive traversal algorithm / software piracy / / Movie At first sight / / OperatingSystem Windows XP / Linux / Microsoft Windows / / Organization E. P. Markatos Institute of Computer Science / Foundation for Research & Technology / K. G. Anagnostakis Institute for Infocomm Research / / Person Evangelos P. Markatos / / Product styx / / ProgrammingLanguage L / J / R / C / / Technology encryption / virtual machine / HTTP protocol / neural network / Linux / attack detection technology / 4.2 Detection algorithm / HTTP / virtual processor / detection technology / payload encryption / virtual memory / application protocol / UDP / recursive traversal algorithm / detection algorithm / emulation-based polymorphic shellcode detection algorithm / /
SocialTag |