Web Security.pptVIP

  • 3
  • 0
  • 约1.43万字
  • 约 37页
  • 2017-02-15 发布于北京
  • 举报
Web Security.ppt

JSGuard (2) It’s hard to fool our method: [20] Shellcode can use JS code execution environment information to fool other dynamic analysis approaches Our design leverages system’s context information Shellcode can use target process’s virtual memory information to fool other dynamic analysis approaches Our design uses target processes’ virtual memory information Shellcode can avoid GetPC code to fool other dynamic analysis approaches Our method does not rely on GetPC code for detection. We leverage real virtual memory content to decode instructions and emulate their execution JSGuard (3) JSGu

文档评论(0)

1亿VIP精品文档

相关文档