Polymorphic code

Results: 35



#Item
21CHAPTER 1  INTRODUCTION 1.1

CHAPTER 1 INTRODUCTION 1.1

Add to Reading List

Source URL: eprints.utm.my

Language: English - Date: 2012-07-03 03:57:07
22Impeding Malware Analysis Using Conditional Code Obfuscation Monirul Sharif1 1 Andrea Lanzi2

Impeding Malware Analysis Using Conditional Code Obfuscation Monirul Sharif1 1 Andrea Lanzi2

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2008-01-28 08:33:00
23:: Heuristic Analysis— Detecting Unknown Viruses Anti-virus does much more than reactively detect known viruses; it proactively scans for unknown ones too.

:: Heuristic Analysis— Detecting Unknown Viruses Anti-virus does much more than reactively detect known viruses; it proactively scans for unknown ones too.

Add to Reading List

Source URL: www.eset.com

Language: English - Date: 2011-02-28 17:14:03
24The Evolving Virus Threat Mr. Carey Nachenberg Chief Researcher, Symantec Corporation Over the past twenty years, computer viruses have evolved from simple computer programs capable of spreading on a single PC to complex

The Evolving Virus Threat Mr. Carey Nachenberg Chief Researcher, Symantec Corporation Over the past twenty years, computer viruses have evolved from simple computer programs capable of spreading on a single PC to complex

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
2511310863_HTTST_tb.qxd[removed]:03 PM

11310863_HTTST_tb.qxd[removed]:03 PM

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2006-10-31 19:47:03
26

PDF Document

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2009-10-28 10:35:48
27Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow  Fabian Monrose

Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow Fabian Monrose

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2012-08-20 18:04:07
28J Comput Virol[removed]:257–274 DOI[removed]s11416[removed]z O R I G I NA L PA P E R  Network-level polymorphic shellcode detection using emulation

J Comput Virol[removed]:257–274 DOI[removed]s11416[removed]z O R I G I NA L PA P E R Network-level polymorphic shellcode detection using emulation

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2009-10-19 10:25:58
29STRIDE: POLYMORPHIC SLED DETECTION THROUGH INSTRUCTION SEQUENCE ANALYSIS P. Akritidis1, E. P. Markatos1, M. Polychronakis1, and K. Anagnostakis2 1

STRIDE: POLYMORPHIC SLED DETECTION THROUGH INSTRUCTION SEQUENCE ANALYSIS P. Akritidis1, E. P. Markatos1, M. Polychronakis1, and K. Anagnostakis2 1

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2009-10-19 10:45:13
30Int. J. Open Problems Compt. Math., Vol. 1, No. 2, September[removed]Computer Virus Strategies and Detection

Int. J. Open Problems Compt. Math., Vol. 1, No. 2, September[removed]Computer Virus Strategies and Detection

Add to Reading List

Source URL: www.emis.de

Language: English - Date: 2010-07-18 14:17:42