Enhancing AV-avoidance capabilities of a PE crypter

ΧΣ Παπαδιώτης - 2014 - dione.lib.unipi.gr
Penetration Testers use a wide range of publicly available or custom made tools in their
attempt to bypass security controls of the targeted systems during security assessments. A …

A theoretical implementation of Blended Program Analysis for virus signature extraction

V Sharma - 2011 Carnahan Conference on Security …, 2011 - ieeexplore.ieee.org
Usually, two methods are used in order to detect a virus viz. Signature detection and
Anomaly detection. In this paper, we'll talk about the signature extraction process. Virus …

[引用][C] A Comparative Study on Brute-Force String Matching and Boyer-Moore String Matching

LL Lin, MT Soe