Jump to content
Tuts 4 You

Tutorials About Viruses


Recommended Posts

Tutorials About Viruses

Link download:



Tutorials list: (176 tutorials)

64-bit rugrats.pdf                                                                                     
A Survey of Cryptologic Issues in Computer Virology.pdf                                                
Advanced Code Evolution Techniques and Computer Virus Generator Kits.pdf                               
Advanced Metamorphic Techniques in Computer Viruses.pdf                                                
Advanced Polymorphic Techniques.pdf                                                                    
AGIS- Towards Automatic Generation of Infection Signatures.pdf                                         
Are Metamorphic Viruses Really Invincible-.pdf                                                         
Attacks on Win32 - Part II.pdf                                                                         
Attacks on Win32.pdf                                                                                   
Avoiding Windows Rootkit Detection.pdf                                                                 
Blast off!.pdf                                                                                         
Blended Attacks Exploits, Vulnerabilities and Buffer-Overflow Techniques in Computer Viruses.pdf       
Bolzano Bugs NT.pdf                                                                                    
Breaking the Lorez.pdf                                                                                 
Cabirn fever.pdf                                                                                       
Cain and Abul.pdf                                                                                      
Chamber of horrors.pdf                                                                                 
Chiba witty blues.pdf                                                                                  
Comparative analysis of various ransomware virii.pdf                                                   
Computer Virus Strategies and Detection Methods.pdf                                                    
Computer Viruses- The Technology and Evolution of an Artificial Life Form.pdf                          
Coping with Cabanas.pdf                                                                                
CPU bugs, CPU backdoors and consequences on security.pdf                                               
Crimea river.pdf                                                                                       
Cryptography- all-out attacks or how to attack cryptography without intensive cryptanalysis.pdf        
Cryptography and Viruses.pdf                                                                           
Deelaed learning.pdf                                                                                   
Defeating Kernel Native API Hookers by Direct Service Dispatch Table Restoration.pdf                   
Defeating Polymorphism- Beyond Emulation.pdf                                                           
Defense Against the Dark Arts.pdf                                                                      
Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection.pdf                           
Detecting Internet Worms Using Data Mining Techniques.pdf                                              
Detecting Kernel-Level Rootkits Through Binary Analysis.pdf                                            
Detecting Malicious Code by Model Checking.pdf                                                         
Detecting Metamorphic Computer Viruses using Supercompilation.pdf                                      
Detecting Metamorphic viruses by using Arbitrary Length of Control Flow Graphs and Nodes Alignment.pdf
Detecting Network-based Obfuscated Code Injection Attacks Using Sandboxing.pdf                         
Detecting self-mutating malware using control-flow graph matching.pdf                                  
Detecting Unknown Computer Viruses.pdf                                                                 
Detecting Virus Mutations Via Dynamic Matching.pdf                                                     
Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code.pdf                        
Detection of Self-Mutating Computer Viruses.pdf                                                        
Discovering and exploiting 802.11 wireless driver vulnerabilities.pdf                                  
Do the macarena.pdf                                                                                    
Doin' the eagle rock.pdf                                                                               
Drill Seeker.pdf                                                                                       
Dynamic detection and classi cation of computer viruses using general behaviour patterns.pdf           
Dynamical Models for Computer Viruses Propagation.pdf                                                  
Efficient Static Analysis of Executables For Detecting Malicious Behaviors.pdf                         
Effusion - a new sophisticated injector for Nginx web servers.pdf                                      
Enforcing kernel constraints by hardware-assisted virtualization.pdf                                   
Evolution, Ecology and Optimization of Digital Organisms.pdf                                           
Evolvable Malware.pdf                                                                                  
Examining Viruses.pdf                                                                                  
Fighting EPO Viruses.pdf                                                                               
File system driver filtering against metamorphic viral coding.pdf                                      
Filter-resistant code injection on ARM.pdf                                                             
Flibi- Evolution.pdf                                                                                   
Gatt got your tongue.pdf                                                                               
Happy Gets Lucky-.pdf                                                                                  
Heads or tails.pdf                                                                                     
Hidan and dangerous.pdf                                                                                
Hidden Rootkits in Windows.pdf                                                                         
Hide'n'Seek- Anatomy of Stealth Malware.pdf                                                            
High Anxiety.pdf                                                                                       
High-Performance Context-Free Parser for Polymorphic Malware Detection.pdf                             
History of Viruses & Worms.pdf                                                                         
'Holey' virus, Batman!.pdf                                                                             
How dumaru-.pdf                                                                                        
Hunting For Metamorphic.pdf                                                                            
Hunting for undetectable metamorphic viruses.pdf                                                       
Identification of file infecting viruses through detection of self-reference replication.pdf           
Imitation of Life- Advanced system for native Artificial Evolution.pdf                                 
Impeding Malware Analysis Using Conditional Code Obfuscation.pdf                                       
Implementing and Detecting an ACPI BIOS Rootkit.pdf                                                    
Improving antivirus accuracy with hypervisor assisted analysis.pdf                                     
Introducing Stealth Malware Taxonomy.pdf                                                               
It's a bird, it's a plane, it's Fooperman.pdf                                                          
It's zell(d)ome the one you expect.pdf                                                                 
Junkie Memorial-.pdf                                                                                   
Know Your Enemy- Containing Conficker.pdf                                                              
Leaps and Bounds.pdf                                                                                   
Let them eat brioche.pdf                                                                               
Linux 2.6 kernel exploits.pdf                                                                          
Linux Improvised Userland Scheduler Virus.pdf                                                          
Loathing Lupper in Linux.pdf                                                                           
Look at that escargot.pdf                                                                              
Looking a Bagift-Horse in the Mouth.pdf                                                                
Magisterium Abraxas.pdf                                                                                
Malicious crypto - (Ab)use cryptology.pdf                                                              
Malicious origami in PDF.pdf                                                                           
Malware Analyst's Cookbook and DVD.pdf                                                                 
Mayhem - a hidden threat for -nix web servers.pdf                                                      
Measuring virtual machine detection in malware using DSD tracer.pdf                                    
Memory scanning under Windows NT.pdf                                                                   
Metamorphic Virus- Analysis and Detection.pdf                                                          
Mobile Malware Attacks and Defense.pdf                                                                 
Modern operating systems.pdf                                                                           
Mostly harmless.pdf                                                                                    
Moving To Windows 2000.pdf                                                                             
Network-level polymorphic shellcode detection using emulation.pdf                                      
New threats of Java viruses.pdf                                                                        
Next-Generation Viruses Present New Challenges.pdf                                                     
Not worthy.pdf                                                                                         
On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits.pdf        
On the Effectiveness of Address-Space Randomization.pdf                                                
Paradise lost.pdf                                                                                      
Parvo - One Sick Puppy-.pdf                                                                            
Peer-to-Peer Botnets- Analysis and Detection.pdf                                                       
Poetry in Motion.pdf                                                                                   
Polymorphic and Metamorphic Malware Detection.pdf                                                      
Practical Detection of Metamorphic Computer Viruses.pdf                                                
Practical Malware Analysis.pdf                                                                         
Prescription Medicine.pdf                                                                              
Prophet and loss.pdf                                                                                   
Raised hacklez.pdf                                                                                     
Revealing Packed Malware.pdf                                                                           
Reverse Code Engineering- An In-Depth Analysis of the Bagle Virus.pdf                                  
Reverse Engineering Malware.pdf                                                                        
Sandbox Technology Inside AV Scanners.pdf                                                              
Secure and advanced unpacking using computer emulation.pdf                                             
Semi-automatic binary protection tampering.pdf                                                         
Shadow Walker - Raising The Bar For Rootkit Detection.pdf                                              
Sharpei Behaviour.pdf                                                                                  
Shelling Out.pdf                                                                                       
SirCamstantial Evidence.pdf                                                                            
Sobig, sobigger, sobiggest.pdf                                                                         
Something smells fishy.pdf                                                                             
Spyware & Rootkits.pdf                                                                                 
Static Analysis of Binary Code to Isolate Malicious Behaviors.pdf                                      
Static Analysis of Executables to Detect Malicious Patterns.pdf                                        
Static Detection of Malicious Code in Executable Programs.pdf                                          
Stealth malware analysis from kernel space with Kolumbo.pdf                                            
Stealth Survival.pdf                                                                                   
Stoned Bootkit.pdf                                                                                     
Stream of Consciousness.pdf                                                                            
Striking Similarities.pdf                                                                              
Tasting Donut.pdf                                                                                      
Testing the SETIHacker Hypothesis.pdf                                                                  
The Art of Computer Virus Research and Defense.pdf                                                     
The Giant Black Book of Computer Viruses (2nd ed.).pdf                                                 
The Giant Black Book of Computer Viruses.pdf                                                           
The Invirsible Man.pdf                                                                                 
The Java Mobile Risk.pdf                                                                               
The Little Black Book of Computer Viruses.pdf                                                          
The Marburg Situation.pdf                                                                              
The missing LNK.pdf                                                                                    
The New 32-bit Medusa.pdf                                                                              
The Norman Book on Computer Viruses.pdf                                                                
The Rise of AutoRunBased Malware.pdf                                                                   
The Risk of Debug Codes in Batch- what are debug codes and why they are dangerous-.pdf                 
The Use of Heuristics in Identifying Self-Propagating Malicious Mobile Code.pdf                        
The wormpipe strikes back.pdf                                                                          
Thoughts about Cross-View based Rootkit Detection.pdf                                                  
Time machine.pdf                                                                                       
To catch Efish.pdf                                                                                     
Tricky Relocations.pdf                                                                                 
Trojan White Paper.pdf                                                                                 
Tumours and polips.pdf                                                                                 
Twinkle, twinkle little star.pdf                                                                       
Un combate con el Kerñado.pdf                                                                          
Understanding and Managing Polymorphic Viruses.pdf                                                     
Unexpected Resutls [sic].pdf                                                                           
User-mode memory scanning on 32-bit & 64-bit windows.pdf                                               
Virology 101.pdf                                                                                       
VT Integrity Services for Networking.pdf                                                               
When Java Was One- Threats From Hostile Byte Code.pdf                                                  
When Malware Meets Rootkits.pdf                                                                        
Worm wars.pdf                                                                                          
Zeroing in on Metamorphic Computer Viruses.pdf                                                         
Zmist Opportunities.pdf                                                                                

Edited by CodeCracker
  • Like 4
Link to comment

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Create New...