有助于 发表于 2025-3-23 10:30:49

http://reply.papertrans.cn/47/4609/460870/460870_11.png

thrombus 发表于 2025-3-23 14:16:38

http://reply.papertrans.cn/47/4609/460870/460870_12.png

Ingrained 发表于 2025-3-23 18:22:35

http://reply.papertrans.cn/47/4609/460870/460870_13.png

Obscure 发表于 2025-3-23 23:36:44

Portable Executable File Format,ecuted on any version of windows. The format is also being used by 32-bit dlls and Windows NT device derivers. The WINNT.H header file defines the structure definition representation for the PE file format..Understanding of PE file format is not only required for reverse engineering, but it is also

文字 发表于 2025-3-24 02:41:57

Fundamental of Reverse Engineering,lowed by a discussion on the packers and their protection mechanism. Packers, which disassemble the binaries, also prevent reverse engineering of software. The chapter concludes with the unpacking mechanisms. Some of these sections also appeared in the book titled "Vulnerability Analysis and Defense

伪证 发表于 2025-3-24 09:17:49

1568-2633 oners and researchers writing signatures to prevent virus and software vulnerabilities. This book is also suitable for advanced-level students in computer science and engineering studying information security, as a secondary textbook or reference..978-0-387-89468-3Series ISSN 1568-2633 Series E-ISSN 2512-2193

Cupping 发表于 2025-3-24 11:16:50

Fundamental of Windows,andomization (ASLR). ASLR involves randomly arranging the positions of key data areas. This includes the base of the executable and position of libraries, heap, and stack, in a process‘s address space. ASLR is effective in prevention against the buffer overflow exploits. Access Control List is provi

Infect 发表于 2025-3-24 15:11:39

Identifying Malicious Code Through Reverse Engineering

积极词汇 发表于 2025-3-24 21:57:54

http://reply.papertrans.cn/47/4609/460870/460870_19.png

碳水化合物 发表于 2025-3-25 01:33:32

http://reply.papertrans.cn/47/4609/460870/460870_20.png
页: 1 [2] 3 4
查看完整版本: Titlebook: Identifying Malicious Code Through Reverse Engineering; Abhishek Singh Book 2009 The Editor(s) (if applicable) and The Author(s), under ex