Now showing items 1-1 of 1
Malware, Encryption, and Rerandomization - Everything is Under Attack
(Journal article; Peer reviewed, 2017)
A malware author constructing malware wishes to infect a specific location in the network. The author will then infect n initial nodes with n different variations of his malicious code. The malware continues to infect ...