-
1
-
-
48749121111
-
-
C. Peikari, S. Fogie, and Ratter/29A, Details Emerge on the First Windows Mobile Virus, September 2004. http://www.informit.com/articles/ article.asp?p=337071.
-
C. Peikari, S. Fogie, and Ratter/29A, "Details Emerge on the First Windows Mobile Virus," September 2004. http://www.informit.com/articles/ article.asp?p=337071.
-
-
-
-
2
-
-
48749086973
-
-
C. Peikari, S. Fogie, Ratter/29A, and J. Read, Reverse-Engineering the First Pocket PC Trojan, Oct. 2004. http://www.informit.com/articles/ article.asp?p=340544.
-
C. Peikari, S. Fogie, Ratter/29A, and J. Read, "Reverse-Engineering the First Pocket PC Trojan," Oct. 2004. http://www.informit.com/articles/ article.asp?p=340544.
-
-
-
-
5
-
-
48749101868
-
Voraussetzungen für die Entwicklung von Malware unter Windows Mobile 5,
-
Diploma thesis, RWTH Aachen, Feb, in German
-
B. Leidner, "Voraussetzungen für die Entwicklung von Malware unter Windows Mobile 5," Diploma thesis, RWTH Aachen, Feb. 2007. (in German); http://pi1.informatik.uni-mannheim.de/filepool/theses/diplomarbeit- 2007-leidner.pdf.
-
(2007)
-
-
Leidner, B.1
-
6
-
-
33750436929
-
About malicious software in smartphones
-
S. Töyssy and M. Helenius, "About malicious software in smartphones," Journal in Computer Virology, vol. 2, no. 2, pp. 109-119, 2006.
-
(2006)
Journal in Computer Virology
, vol.2
, Issue.2
, pp. 109-119
-
-
Töyssy, S.1
Helenius, M.2
-
8
-
-
48749128533
-
-
san@xfocus.org, Hacking Windows CE, Phrack Magazin, 6, July 2005. http://www.phrack.org/archives/63/p63-0x06_Hacking_WindowsCE. txt.
-
san@xfocus.org, "Hacking Windows CE," Phrack Magazin, vol. 6, July 2005. http://www.phrack.org/archives/63/p63-0x06_Hacking_WindowsCE. txt.
-
-
-
-
9
-
-
48749098536
-
-
C. Mulliner, Exploiting PocketPC. What The Hack 2005, Netherlands, July 2005. Slides at http://wiki.whatthehack.org/images/c/c0/ Collinmulliner_wth2005_exploiting_pocketpc.pdf.
-
C. Mulliner, "Exploiting PocketPC." What The Hack 2005, Netherlands, July 2005. Slides at http://wiki.whatthehack.org/images/c/c0/ Collinmulliner_wth2005_exploiting_pocketpc.pdf.
-
-
-
-
10
-
-
48749121429
-
-
S. Fogie, Reverse Engineering Mobile Binaries. DEF CON 11, Las Vegas, USA, Aug. 2003. Slides at http://www.airscanner.com/pubs/fogieDC11. pdf.
-
S. Fogie, "Reverse Engineering Mobile Binaries." DEF CON 11, Las Vegas, USA, Aug. 2003. Slides at http://www.airscanner.com/pubs/fogieDC11. pdf.
-
-
-
-
11
-
-
39049086351
-
Vulnerability Analysis of MMS User Agents
-
Washington, DC, USA, pp, IEEE Computer Society
-
C. Mulliner and G. Vigna, "Vulnerability Analysis of MMS User Agents," in ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference, (Washington, DC, USA), pp. 77-88, IEEE Computer Society, 2006.
-
(2006)
ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference
, pp. 77-88
-
-
Mulliner, C.1
Vigna, G.2
-
12
-
-
0031123773
-
A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior
-
E. Jonsson and T. Olovsson, "A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior," IEEE Trans. Softw. Eng., vol. 23, no. 4, pp. 235-245, 1997.
-
(1997)
IEEE Trans. Softw. Eng
, vol.23
, Issue.4
, pp. 235-245
-
-
Jonsson, E.1
Olovsson, T.2
-
14
-
-
0012112708
-
-
Addison-Wesley Professional, second edition ed, June
-
D. Seal, ARM Architecture Reference Manual. Addison-Wesley Professional, second edition ed., June 2000.
-
(2000)
ARM Architecture Reference Manual
-
-
Seal, D.1
-
15
-
-
48749111806
-
-
GNU.org homepage
-
"GNU.org homepage." http://www.gnu.org.
-
-
-
-
16
-
-
48749087528
-
-
The Metasploit Project
-
"The Metasploit Project." http://www.metasploit.org.
-
-
-
-
18
-
-
48749084542
-
-
CeGCC's web page
-
"CeGCC's web page." http://cegcc.berlios.de/.
-
-
-
-
19
-
-
48749111540
-
Protocol Standard for a NetBIOS Service on a TCP/UDP Transport: Concepts and Methods, RFC 1001
-
Network Working Group, Mar
-
"Protocol Standard for a NetBIOS Service on a TCP/UDP Transport: Concepts and Methods, RFC 1001," in Request for Comments, Network Working Group, Mar. 1987. http://www.faqs.org/rfcs/rfc1001.html.
-
(1987)
Request for Comments
-
-
-
21
-
-
84946237235
-
Buffer overflows: Attacks and defenses for the vulnerability of the decade
-
C. Cowan, P. Wagle, C. Pu, S. Beattie, and J. Walpole, "Buffer overflows: attacks and defenses for the vulnerability of the decade," Foundations of Intrusion Tolerant Systems, 2003.
-
(2003)
Foundations of Intrusion Tolerant Systems
-
-
Cowan, C.1
Wagle, P.2
Pu, C.3
Beattie, S.4
Walpole, J.5
-
22
-
-
38049018397
-
Compiler security checks in depth
-
Feb, VS.71.aspx
-
B. Bray, "Compiler security checks in depth," Feb. 2002. http://msdn2.microsoft.com/en-us/library/aa290051(VS.71).aspx.
-
(2002)
-
-
Bray, B.1
|