Amanote Research

Amanote Research

    RegisterSign In

Reverse Engineering for Malicious Code Behavior Analysis Using Virtual Security Patching

International Journal of Computer Applications
doi 10.5120/3088-4233
Full Text
Open PDF
Abstract

Available in full text

Date

July 31, 2011

Authors
A.Edwin RobertG. ManivasagamN. SasirekhaM. Hemalatha
Publisher

Foundation of Computer Science


Related search

A Software Complex for Revealing Malicious Behavior in Untrusted Binary Code

Proceedings of the Institute for System Programming of the RAS
2019English

A Patterns Based Reverse Engineering Approach for Java Source Code

2012English

SAAT: Reverse Engineering for Performance Analysis

2004English

Laboratory Room Security Safety System Electrical Engineering Department Using Digital Access Code

International Journal of Computer Applications
2018English

Reverse Engineering Integrated Circuits Using Finite State Machine Analysis

2017English

Configurable Security Protocols for Multi-Party Data Analysis With Malicious Participants

English

Reverse Engineering of Design Patterns From Java Source Code

2006English

Virtual Reality Environment for Patching and Imaging in Brain Slices

Biophysical Journal
Biophysics
2015English

COSAK: Code Security Analysis Kit

2004English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy