Searched for: "on the infeasibility of modeling polymorphic shellcode"
About 2 results for "on the infeasibility of modeling polymorphic shellcode"
Polymorphic malcode remains one of the most troubling threats for information security and intrusion defense systems. The ability for malcode to be automatically transformed into t...
On the Infeasibility of Modeling Polymorphic Shellcode Re-Thinking the Role of Learning in Intrusion Detection Systems
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...