Back to Results
First PageMeta Content
Multi-agent systems / Antivirus software / Software / Malware / Spamming / Computer virus / Leap / Botnet / Computer security / Computer network security / Computing / System software


Software Distribution Malware Infection Vector Felix Gr¨obert, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security Ruhr-Universit¨at Bochum dia player VLC1 .Typical protection mechanisms such as
Add to Reading List

Document Date: 2008-07-18 17:30:01


Open Document

File Size: 218,47 KB

Share Result on Facebook

City

MZ / Amsterdam / /

Company

IBM / Information Security Solutions Europe / Advanced Micro Devices Inc. / Exploiting Embedded Systems / Intel Corporation / Layer 2 Switched Local Area Networks / Trusted Computing Group / /

Country

Germany / /

Event

FDA Phase / /

Facility

Marcel Winandy Horst G¨ortz Institute / /

IndustryTerm

free and open source software / downloadable applications / certain malware applications / secure and interoperable operating systems / download server / commodity computing platforms / application server / free software / virus infection routines and network / required organizational and technical infrastructure / platform technology / software distribution system / software distribution sites / antivirus tools / network intrusion detection systems / anti-malware tools / technology architectural overview / malicious software / open source application software / trust management / probed technology / non-writable boot media / visible-started software / large network / software applications / decryption algorithms / free and open software applications / code decryption algorithms / secured protocols / secure operating systems / commodity operating systems / law enforcement / computing / network transmission protocol / Internet service / Wireless LAN takeovers / binary executable applications / security protocols / automatic wireless network selection / context virtualization technology / software distribution / /

Movie

Man in the middle / /

OperatingSystem

Windows Vista / Mac OS X / Linux / Windows 98 / DOS / Windows XP / Microsoft Windows / /

Organization

federal investigation office / U.S. Securities and Exchange Commission / Marcel Winandy Horst G¨ortz Institute for IT Security Ruhr-Universit¨at Bochum / IEEE Computer Society / /

Person

Figure / /

Position

system administrator / Engineer / author / dia player / seeking forward / administrator / /

Product

ARP injection / IPv6 / /

ProgrammingLanguage

C / XML / php / /

PublishedMedium

ARES / /

Technology

cryptographically secured protocols / virtual machine / IPv6 / device encryption / malformed protocol / context virtualization technology / Linux / API / VPN / security protocols / operating system / SSL / decryption algorithms / operating systems / ap3 Algorithm / unauthenticated protocol / intended algorithm / encryption / IPv6 Protocol / network protocol / 3 protocols / DNS / code decryption algorithms / LaGrande technology / ISP / HTTP / 1 Protocol Handling Algorithm / computing platform technology / underlying protocol / following algorithms / Wireless LAN / network transmission protocol / compromised router / /

URL

http /

SocialTag