Back to Results
First PageMeta Content
Shellcode / Malware / Software bugs / Hooking / Polymorphic code / Windows API / Code injection / Exploit / Application programming interface / Cyberwarfare / Computer security / Computing


Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow Fabian Monrose
Add to Reading List

Document Date: 2014-09-05 15:38:44


Open Document

File Size: 220,45 KB

Share Result on Facebook
UPDATE