<--- Back to Details
First PageDocument Content
Polymorphic code / Antivirus software / Virus Bulletin / Polymorphic engine / Dark Avenger / Viral disease / Virus / Simile / Metamorphic code / Malware / System software / Computer viruses
Date: 2011-09-27 16:13:20
Polymorphic code
Antivirus software
Virus Bulletin
Polymorphic engine
Dark Avenger
Viral disease
Virus
Simile
Metamorphic code
Malware
System software
Computer viruses

VIRUS BULLETIN CONFERENCE, SEPTEMBER 2001 • 123 HUNTING FOR METAMORPHIC Péter Ször and Peter Ferrie Symantec Corporation, 2500 Broadway, Suite 200, Santa Monica, CA[removed], USA Tel + [removed] • Fax +1 31

Add to Reading List

Source URL: pferrie.host22.com

Download Document from Source Website

File Size: 231,81 KB

Share Document on Facebook

Similar Documents

An Empirical Study of Real-world Polymorphic Code Injection Attacks Michalis Polychronakis∗ Kostas G. Anagnostakis†  Abstract

An Empirical Study of Real-world Polymorphic Code Injection Attacks Michalis Polychronakis∗ Kostas G. Anagnostakis† Abstract

DocID: 1tpH7 - View Document

BioZoom  EMERGING TOOLS FOR RNA STRUCTURE ANALYSIS IN POLYMORPHIC DATA RADHAKRISHNAN SABARINATHAN 1,2, STEFAN E SEEMANN 2 AND JAN GORODKIN 2

BioZoom EMERGING TOOLS FOR RNA STRUCTURE ANALYSIS IN POLYMORPHIC DATA RADHAKRISHNAN SABARINATHAN 1,2, STEFAN E SEEMANN 2 AND JAN GORODKIN 2

DocID: 1oLzH - View Document

Code reuse through polymorphic variants∗ Jacques Garrigue November 8, 2000 Abstract Their support for code reuse has made object-oriented languages popular. However,

Code reuse through polymorphic variants∗ Jacques Garrigue November 8, 2000 Abstract Their support for code reuse has made object-oriented languages popular. However,

DocID: 1m97T - View Document

Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow  Fabian Monrose

Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow Fabian Monrose

DocID: 1gi1i - View Document

State of New Mexico Statewide Architectural Configuration Requirements Title: Virus and Malicious Code Standard S-STD006.001 Effective Date: April 7, 2005 1.

State of New Mexico Statewide Architectural Configuration Requirements Title: Virus and Malicious Code Standard S-STD006.001 Effective Date: April 7, 2005 1.

DocID: 19nIn - View Document