CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - Malware
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - Malware - List
[
Software Engineering
]
Network_Security
DL : 0
Detecting Network Intrusions via Sampling_A Game Theoretic Approach Internet Quarantine_Requirements for Containing Self-Propagating Code Modeling Malware Spreading Dynamics Modeling the Spread of Active Worms
Date
: 2025-12-25
Size
: 1.45mb
User
:
whr
[
Software Engineering
]
5
DL : 0
Executing malware in a controlled environment is one of the most popular and effective methods of extracting the behavior characters of malware. In this paper, we propose a dynamic analysis technique to explore the different behaviors of malware. We utilized environment constitution to create comprehensive reports on malware.
Date
: 2025-12-25
Size
: 332kb
User
:
oulding
[
Software Engineering
]
Introduction-to-File-Infection-Techniques
DL : 0
This paper was written within the scope of the author´ s own learning process, during her studies of computer science and on the basis of her own malware analyses. It was published in order to offer an introduction to several file infection techniques used by viruses, showing examples and explaining appropriate countermeasures. It is aimed at everyone who is interested in the topic of malware and does not require previous knowledge, though a basic understanding of the PE file format, virtual memory management and the Windows OS in general is advantageous.
Date
: 2025-12-25
Size
: 394kb
User
:
kgch
[
Software Engineering
]
SyScan2013_DAY1_SPEAKER03_Nguyen_Anh_Quynh_Optico
DL : 0
OptiCode: Machine Code Deobfuscation for Malware Analysis Nguyen Anh Quynh, COSEINC <aquynh -at- gmail.com> Syscan Singapore 2013, April 25th
Date
: 2025-12-25
Size
: 287kb
User
:
solidsnake
[
Software Engineering
]
360toolstck
DL : 0
三百六杀毒防外挂和木马恶意软件....希望可以帮到大家-Three hundred sixty anti-virus plug-and trojan malware .... hope you can help us
Date
: 2025-12-25
Size
: 647kb
User
:
sam
[
Software Engineering
]
auto-reversing-of-mal-emulator
DL : 0
Malware authors have recently begun using emulation technology to obfuscate their code.In this paper, we present the first work in automatic reverse engineering of malware emulators.-Automatic Reverse Engineering of Malware Emulators
Date
: 2025-12-25
Size
: 1013kb
User
:
userasp
[
Software Engineering
]
ClusterMalwareWithKmeans
DL : 0
Partitional Clustering of Malware using K-Means
Date
: 2025-12-25
Size
: 499kb
User
:
vivek
[
Software Engineering
]
goddless-mobile-malware-uses-multiple-exploits-to
DL : 0
goddless mobile device security
Date
: 2025-12-25
Size
: 302kb
User
:
john
[
Software Engineering
]
web-malware
DL : 0
Vulnerability detection tools are frequently considered the silver-bullet for detecting vulnerabilities in web services. However, research shows that the effectiveness of most of those tools is very low and that using the wrong tool may lead to the deployment of services with undetected vulnerabilities. In this paper we propose a benchmarking approach to assess and compare the effectiveness of vulnerability detection tools in web services environments. This approach was used to define a concrete benchmark for SQL Injection vulnerability detection tools. This benchmark is demonstrated by a real example of benchmarking several widely used tools, including four penetration-testers, three static code analyzers, and one anomaly detector. Results show that the benchmark accurately portrays the effectiveness of vulnerability detection tools and suggest that the proposed approach can be applied in the field.
Date
: 2025-12-25
Size
: 365kb
User
:
Maddy
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.