Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - Malware
Search - Malware - List
Detecting Network Intrusions via Sampling_A Game Theoretic Approach Internet Quarantine_Requirements for Containing Self-Propagating Code Modeling Malware Spreading Dynamics Modeling the Spread of Active Worms
Date : 2025-12-25 Size : 1.45mb User : whr

Executing malware in a controlled environment is one of the most popular and effective methods of extracting the behavior characters of malware. In this paper, we propose a dynamic analysis technique to explore the different behaviors of malware. We utilized environment constitution to create comprehensive reports on malware.
Date : 2025-12-25 Size : 332kb User : oulding

This paper was written within the scope of the author´ s own learning process, during her studies of computer science and on the basis of her own malware analyses. It was published in order to offer an introduction to several file infection techniques used by viruses, showing examples and explaining appropriate countermeasures. It is aimed at everyone who is interested in the topic of malware and does not require previous knowledge, though a basic understanding of the PE file format, virtual memory management and the Windows OS in general is advantageous.
Date : 2025-12-25 Size : 394kb User : kgch

OptiCode: Machine Code Deobfuscation for Malware Analysis Nguyen Anh Quynh, COSEINC <aquynh -at- gmail.com> Syscan Singapore 2013, April 25th
Date : 2025-12-25 Size : 287kb User : solidsnake

三百六杀毒防外挂和木马恶意软件....希望可以帮到大家-Three hundred sixty anti-virus plug-and trojan malware .... hope you can help us
Date : 2025-12-25 Size : 647kb User : sam

Malware authors have recently begun using emulation technology to obfuscate their code.In this paper, we present the first work in automatic reverse engineering of malware emulators.-Automatic Reverse Engineering of Malware Emulators
Date : 2025-12-25 Size : 1013kb User : userasp

Partitional Clustering of Malware using K-Means
Date : 2025-12-25 Size : 499kb User : vivek

goddless mobile device security
Date : 2025-12-25 Size : 302kb User : john

Vulnerability detection tools are frequently considered the silver-bullet for detecting vulnerabilities in web services. However, research shows that the effectiveness of most of those tools is very low and that using the wrong tool may lead to the deployment of services with undetected vulnerabilities. In this paper we propose a benchmarking approach to assess and compare the effectiveness of vulnerability detection tools in web services environments. This approach was used to define a concrete benchmark for SQL Injection vulnerability detection tools. This benchmark is demonstrated by a real example of benchmarking several widely used tools, including four penetration-testers, three static code analyzers, and one anomaly detector. Results show that the benchmark accurately portrays the effectiveness of vulnerability detection tools and suggest that the proposed approach can be applied in the field.
Date : 2025-12-25 Size : 365kb User : Maddy
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.