Skip to search formSkip to main contentSkip to account menu

Arbitrary code execution

Known as: Arbitrary code, RCE, Remote code execution 
In computer security, "arbitrary code execution" is used to describe an attacker's ability to execute any command of the attacker's choice on a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
A novel kind of punctured polar codes is proposed in this paper. The codes are constructed by certain constraints on both… 
Highly Cited
2011
Highly Cited
2011
Different studies show that programmers are more interested in finding definitions of functions and their uses than variables… 
Highly Cited
2008
Highly Cited
2008
Attacks often exploit memory errors to gain control over the execution of vulnerable programs. These attacks remain a serious… 
Highly Cited
2006
Highly Cited
2006
The ability to update the program code installed on wireless sensor nodes plays an import role in the highly dynamic environments… 
Highly Cited
1998
Highly Cited
1998
We examine a classification problem in which seismic waveforms of natural earthquakes are to be distinguished from waveforms of… 
Highly Cited
1994
Highly Cited
1994
Highly Cited
1994
Highly Cited
1994
Radial Basis Function (RBF) Networks, also known as networks of locally-tuned processing units (see [6]) are well known for their… 
Highly Cited
1992
Highly Cited
1992
Programmers working on large software systems spend a great deal of time examining code and trying to understand it. Code…