First Page | Document Content | |
---|---|---|
Date: 2014-09-05 15:38:44Shellcode Malware Software bugs Hooking Polymorphic code Windows API Code injection Exploit Application programming interface Cyberwarfare Computer security Computing | Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow Fabian MonroseAdd to Reading ListSource URL: wwwx.cs.unc.eduDownload Document from Source WebsiteFile Size: 220,45 KBShare Document on Facebook |