Skip to search formSkip to main contentSkip to account menu

Arbitrary code execution

Known as: Arbitrary code, RCE, Remote code execution 
In computer security, "arbitrary code execution" is used to describe an attacker's ability to execute any command of the attacker's choice on a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Clustering can be especially effective where the data is irregular, noisy and/or not differentiable. A major obstacle for many… 
2009
2009
Augmented Reality (AR) is an increasingly important application domain for computer graphics and user interface design. In this… 
2009
2009
Cloud computing environments allow customers to execute arbitrary code on hardware owned by a cloud provider. While cloud… 
2009
2009
The tasks of resource classification and retrieval from knowledge bases in the Semantic Web are the basis for a lot of important… 
Highly Cited
2006
Highly Cited
2006
Hardware transactional memory has great potential to simplify the creation of correct and efficient multithreaded programs… 
2006
2006
In this letter, we propose a class of irregular structured low-density parity-check (LDPC) codes with low error floor and low… 
2000
2000
A theoretical model based on Hills general method is developed in the present study to calculate the flow stress in a cylindrical… 
1997
1997
Use of mobile code can make distributed systems and the abstractions they provide more exible to build and use. Richer… 
1977
1977
We describe work in progress on an automatic theorem prover for recursive function theory that we intend to apply in the analysis…