Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
Viewing 1-3 of 3 total results
 Binary Code Disassembly for Reverse Engineering
Journal of Mobile, Embedded and Distributed Systems, vol. IV, no. 4, 2012 ISSN 2067 – 4074 235 Figure 3. Disassembled code of the COM file in td.exe After the assembly instruction int 21h, the next 6 bytes are used to store data in the COM file. The application td.exe considers the 6 bytes as operation codes for binary
 File:Approaches on Internet of Things Solutions.pdf ...
This file is licensed under the Creative Commons Attribution 3.0 Unported license.: You are free: to share – to copy, distribute and transmit the work; to remix – to adapt the work; Under the following conditions: attribution – You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way ...
[1201.0397] Hiding Malicious Content in PDF Documents
Abstract: This paper is a proof-of-concept demonstration for a specific digital signatures vulnerability that shows the ineffectiveness of the WYSIWYS (What You See Is What You Sign) concept. The algorithm is fairly simple: the attacker generates a polymorphic file that has two different types of content (text, as a PDF document for example, and image: TIFF - two of the most widely used file ...
https://arxiv.org/abs/1201.0397
Average Rating (0 votes)