Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,393,519 papers from all fields of science
Search
Sign In
Create Free Account
DLL injection
In computer programming, DLL injection is a technique used for running code within the address space of another process by forcing it to load a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Address space
Bash
Code signing
Computer programming
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
An empirical study of DLL injection bugs in the Firefox ecosystem
Le An
,
M. Castelluccio
,
Foutse Khomh
Empirical Software Engineering
2019
Corpus ID: 254461888
DLL injection is a technique used for executing code within the address space of another process by forcing the load of a dynamic…
Expand
2018
2018
Preventing Reflective DLL Injection on UWP Apps
Mojtaba Zaheri
,
Salman Niksefat
,
B. Sadeghiyan
2018
Corpus ID: 208130790
Universal Windows Platform (UWP) is the Microsoft’s recent platform-homogeneous application architecture. It al-lows a code to…
Expand
2014
2014
Case study of the vulnerability of OTP implemented in internet banking systems of South Korea
Changsok Yoo
,
Byung-Tak Kang
,
H. Kim
Multimedia tools and applications
2014
Corpus ID: 254832320
The security risk of internet banking has increased rapidly as internet banking services have become commonly used by the public…
Expand
2011
2011
A Way to Detect Computer Trojan Based on DLL Preemptive Injection
Guo Yucheng
,
Wu Peng
,
Lin Juwei
,
Guo Qingping
10th International Symposium on Distributed…
2011
Corpus ID: 16128490
Computer Trojan has been threatening the information security of computer systems since its birth. While many companies offer…
Expand
2011
2011
Computing device having a function of DLL injection and method for DLL injection
이남수
,
이종일
2011
Corpus ID: 117652252
The computing apparatus and method DLL injection having a DLL injection function is disclosed. If from the operating system is…
Expand
2009
2009
MBMAS: A System for Malware Behavior Monitor and Analysis
Fuyong Zhang
,
Deyu Qi
,
JingLin Hu
International Symposium on Computer Network and…
2009
Corpus ID: 8593722
In this paper, we present MBMAS, a system for malware behavior monitor and analysis. MBMAS executes a malware sample in a…
Expand
2008
2008
Incident-Driven Memory Snapshot for Full-Virtualized OS Using Interruptive Debugging Techniques
Ruo Ando
,
Y. Kadobayashi
,
Youichi Shinoda
International Symposium on Algorithms
2008
Corpus ID: 15700477
Memory forensics is growing concern. For effective evidence retrieval, it is important to take snapshot timely. With proper…
Expand
2007
2007
Taking Control, Functions to DLL Injection
C. Wright
2007
Corpus ID: 215970776
This article is going to follow from previous articles as well as going into some of the fundamentals that you will need in order…
Expand
2006
2006
A Study on New Treatment Way of a Malicious Code to Use a DLL Injection Technique
Hee-Hwan Park
,
D. Park
2006
Corpus ID: 107374856
A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to…
Expand
2006
2006
DLL injection 기법을 이용하는 악성코드의 새로운 치료 방법 연구
박희환
,
박대우
2006
Corpus ID: 195938575
개인 정보의 탈취에 필요한 악성코드는 Phishing, Pharming메일, VoIP 서비스를 이용하는 Vishing, 모바일 금융을 위장한 SMiShing…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE