Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Dynamic decryption procedures in malware
Sep 24 2006 12:16AM
Omar Herrera (oherrera prodigy net mx)
I wrote a paper on dynamic decryption procedures in malicious software which
can be found here:
Although the use of these techniques might prevent traditional computer
viruses and worms from spreading, they seem particularly u...
[ more ]
Copyright 2010, SecurityFocus