×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [victim process]
Documents
SimPy 1.8 Manual
180 views
Technology
Process injection - Malware style
698 views
Documents
Non-Control-Data Attacks and Securing software by enforcing data- flow integrity Zhiqiang Lin Mar 28, 2007 CS590 paper presentation
218 views
Documents
Characterizing and Defending Against DDoS Attacks Christos Papadopoulos..and many others
227 views
Documents
Malware Dynamic Analysis Part 3 Veronica Kovah vkovah.ost at gmail See notes for citation1
228 views
Documents
User-mode rootkits Modifications to the system at the user-level that hide the attacker and/or provide backdoor access Replace or modify normal binary
233 views
Documents
1 Enhancing Security of Real-World Systems with a Better Understanding of the Threats Shuo Chen Candidate of Ph.D. in Computer Science Center for Reliable
212 views
Documents
User-mode rootkits
103 views
Documents
Automatic Discovery of Parasitic Malware
42 views