SimPy 1.8 Manual
Process injection - Malware style
Non-Control-Data Attacks and Securing software by enforcing data- flow integrity Zhiqiang Lin Mar 28, 2007 CS590 paper presentation.
Characterizing and Defending Against DDoS Attacks Christos Papadopoulos..and many others.
User-mode rootkits Modifications to the system at the user-level that hide the attacker and/or provide backdoor access Replace or modify normal binary.
1 Enhancing Security of Real-World Systems with a Better Understanding of the Threats Shuo Chen Candidate of Ph.D. in Computer Science Center for Reliable.
User-mode rootkits
Automatic Discovery of Parasitic Malware
Malware Dynamic Analysis Part 3 Veronica Kovah vkovah.ost at gmail See notes for citation1 .