![Shellcode / Malware / Software bugs / Hooking / Polymorphic code / Windows API / Code injection / Exploit / Application programming interface / Cyberwarfare / Computer security / Computing Shellcode / Malware / Software bugs / Hooking / Polymorphic code / Windows API / Code injection / Exploit / Application programming interface / Cyberwarfare / Computer security / Computing](https://www.pdfsearch.io/img/1f618d2a39139be0267a244340112772.jpg)
| Document Date: 2012-08-20 18:04:07 Open Document File Size: 239,47 KBShare Result on Facebook
City Abstract Document / Emulation / Bern / / Company Google / / Country Switzerland / / Currency USD / CVE / / / Facility Chapel Hill / Empirical Analyses Kevin Z. Snow Fabian Monrose University of North Carolina / / IndustryTerm web object inspection / Massive data mining / e.g. network / Web conf / intrusion detection systems / web browsers / network operator / client applications / submission server / dynamic code analysis tools / / NaturalFeature Chapel Hill / / OperatingSystem Microsoft Windows / / Organization National Science Foundation / University of North Carolina / / Person Bil Hayes / Srinivas Krishnan / Kevin Z. Snow Fabian / / / Position General / / Product Document-based Code Injection / / ProgrammingLanguage Javascript / / PublishedMedium Machine Learning / / Technology API / http / data mining / Machine Learning / simulation / virtual memory / PDF / / URL http /
SocialTag |