×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [victim process]
SimPy 1.8 Manual
180 views
Process injection - Malware style
698 views
Non-Control-Data Attacks and Securing software by enforcing data- flow integrity Zhiqiang Lin Mar 28, 2007 CS590 paper presentation
218 views
Characterizing and Defending Against DDoS Attacks Christos Papadopoulos..and many others
226 views
Malware Dynamic Analysis Part 3 Veronica Kovah vkovah.ost at gmail See notes for citation1
228 views
User-mode rootkits Modifications to the system at the user-level that hide the attacker and/or provide backdoor access Replace or modify normal binary
233 views
1 Enhancing Security of Real-World Systems with a Better Understanding of the Threats Shuo Chen Candidate of Ph.D. in Computer Science Center for Reliable
212 views
User-mode rootkits
102 views
Automatic Discovery of Parasitic Malware
42 views