Back to Results
First PageMeta Content
Shellcode / Malware / Software bugs / Hooking / Polymorphic code / Windows API / Code injection / Exploit / Application programming interface / Cyberwarfare / Computer security / Computing


Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow Fabian Monrose
Add to Reading List

Document Date: 2012-08-20 18:04:07


Open Document

File Size: 239,47 KB

Share Result on Facebook

City

Abstract Document / Emulation / Bern / /

Company

Google / /

Country

Switzerland / /

Currency

USD / CVE / /

/

Facility

Chapel Hill / Empirical Analyses Kevin Z. Snow Fabian Monrose University of North Carolina / /

IndustryTerm

web object inspection / Massive data mining / e.g. network / Web conf / intrusion detection systems / web browsers / network operator / client applications / submission server / dynamic code analysis tools / /

NaturalFeature

Chapel Hill / /

OperatingSystem

Microsoft Windows / /

Organization

National Science Foundation / University of North Carolina / /

Person

Bil Hayes / Srinivas Krishnan / Kevin Z. Snow Fabian / /

/

Position

General / /

Product

Document-based Code Injection / /

ProgrammingLanguage

Javascript / /

PublishedMedium

Machine Learning / /

Technology

API / http / data mining / Machine Learning / simulation / virtual memory / PDF / /

URL

http /

SocialTag