An Empirical Study of Real-world Polymorphic Code Injection Attacks

 An Empirical Study of Real-world Polymorphic Code Injection AttacksMichalis PolychronakisFORTH-ICS, Greece, email: mikepo@ics.forth.grKostas G. Anag...

2009-11-10 09:08:00

阅读数:4253

评论数:0

Polymorphic Protector

 Among the large amount of malwares we view, we have seen a few this week that were heavily obfuscated by some sort of "polymorphic packer."...

2009-11-10 08:58:00

阅读数:3607

评论数:0

Make your owner PE Protector

 Preface This article was written to provide the better understanding to people who do not have any experience in this field. I am not going to descr...

2009-11-10 08:40:00

阅读数:4395

评论数:0

加密资源节

 作 者: 玩命时 间: 2008-07-10,21:27链 接: http://bbs.pediy.com/showthread.php?t=68262什么是WINDOWS的资源这里就不提了。写过WIN程序的人应该都晓得了。如果没写过,那么。。。建议去写哈。关于加密资源节,也是加壳过程中的一个可...

2009-11-09 20:07:00

阅读数:3220

评论数:0

软件保护壳技术专题 - 反调试器技术

 作 者: 玩命时 间: 2008-08-21,10:38链 接: http://bbs.pediy.com/showthread.php?t=71113反调试是软件保护壳的最基本的功能之一。反调试方法也是多种多样。通过调用标准的API接口,计算指令时间差。查看当调试器加载后的内存的一些标志,还有...

2009-11-09 16:35:00

阅读数:4209

评论数:0

提示
确定要删除当前文章?
取消 删除
关闭
关闭