Jump to content
Nytro

Blended Attacks Exploits, Vulnerabilities and Buffer-Overflow

Recommended Posts

Posted

Blended Attacks Exploits,

Vulnerabilities and Buffer-Overflow

Techniques in Computer Viruses*

By Eric Chien and Péter Ször

Symantec Security Response

INSIDE

- Types of Vulnerability

- Current and Previous Threats

- Current Security

- Combating Blended Threats in the Future

Note: This paper was originally published in Virus Bulletin, 2002

Old stuff...

Download:

http://www.symantec.com/avcenter/reference/blended.attacks.pdf

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...