2/5にdiscussion
Blended Attacks - Exploits, Vulnerabilities and Buffer-Overflow Techniques in Computer Viruses
http://www.peterszor.com/blended.pdf
Blended Attacks - Exploits, Vulnerabilities and Buffer-Overflow Techniques in Computer Viruses
http://www.peterszor.com/blended.pdf