![]() |
Volumn , Issue , 2007, Pages 4-12
|
Analyzing network traffic to detect self-decrypting exploit code
|
Author keywords
Decryption; Detection; Emulation; Exploit code; Polymorphic; Static analysis
|
Indexed keywords
CODES (SYMBOLS);
COMPUTER SOFTWARE;
CRYPTOGRAPHY;
INTRUSION DETECTION;
POLYMORPHISM;
STATIC ANALYSIS;
CODE OBFUSCATION;
DECRYPTION ROUTINES;
REMOTE EXPLOITATION;
COMPUTER NETWORKS;
|
EID: 34748920757
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/1229285.1229291 Document Type: Conference Paper |
Times cited : (43)
|
References (25)
|