<--- Back to Details
First PageDocument Content
Archive formats / Antivirus software / Computer file formats / Zip / Tar / File format / Clam AntiVirus / Computer virus / Portable Executable / System software / Computing / Software
Date: 2012-03-06 01:37:39
Archive formats
Antivirus software
Computer file formats
Zip
Tar
File format
Clam AntiVirus
Computer virus
Portable Executable
System software
Computing
Software

Abusing File Processing in Malware Detectors for Fun and Profit Suman Jana and Vitaly Shmatikov The University of Texas at Austin Abstract—We systematically describe two classes of evasion exploits against automated ma

Add to Reading List

Source URL: www.cs.utexas.edu

Download Document from Source Website

File Size: 247,04 KB

Share Document on Facebook

Similar Documents

Provably Secure Virus Detection: Using The Observer Effect Against Malware∗ Richard J. Lipton1 , Rafail Ostrovsky†‡2 , and Vassilis Zikas§‡3 1  Department of Computer Science, Georgia Institute of Technology, At

Provably Secure Virus Detection: Using The Observer Effect Against Malware∗ Richard J. Lipton1 , Rafail Ostrovsky†‡2 , and Vassilis Zikas§‡3 1 Department of Computer Science, Georgia Institute of Technology, At

DocID: 1uXRS - View Document

AttachmentComputer Virus Reported (1) General Overview for the Year 2012 The number of the cases reported for computer viruses*1 for the year 2012 has decreased from the number for the yearsee Figure 1-1).

AttachmentComputer Virus Reported (1) General Overview for the Year 2012 The number of the cases reported for computer viruses*1 for the year 2012 has decreased from the number for the yearsee Figure 1-1).

DocID: 1ugqX - View Document

Red of ring and gears with malware bug a computer virus inside on binary code background.Vector illustration security technology concept.

Red of ring and gears with malware bug a computer virus inside on binary code background.Vector illustration security technology concept.

DocID: 1tGzz - View Document

Red of ring and gears with malware bug a computer virus inside on binary code background.Vector illustration security technology concept.

Red of ring and gears with malware bug a computer virus inside on binary code background.Vector illustration security technology concept.

DocID: 1tG2S - View Document

Need a  Computer? Pro Anti-Virus

Need a Computer? Pro Anti-Virus

DocID: 1s1sz - View Document