Results 1 - 1 of about 1
Search took 0.02 seconds.
[PDF] FINDING RULES FOR HEURISTIC DETECTION OF MALICIOUS PDFS: WITH ANALYSIS OF EMBEDDED EXPLOIT CODE
... blogs/sophoslabs/?p=9413.  http://www.sophos.com/security/analyses/ viruses-and- spyware/trojagentmyj.html#table4.
In order to show you the most relevant results, we have omitted some entries very similar to the 1 already displayed.
If you like, you can repeat the search with the omitted results included.