Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,109,810 papers from all fields of science
Search
Sign In
Create Free Account
Arbitrary code execution
Known as:
Arbitrary code
, RCE
, Remote code execution
In computer security, "arbitrary code execution" is used to describe an attacker's ability to execute any command of the attacker's choice on a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
28 relations
Adobe Flash
Adobe Flash Player
Bash
Branch (computer science)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
A Novel Puncturing Scheme for Polar Codes
Runxin Wang
,
Rongke Liu
IEEE Communications Letters
2014
Corpus ID: 9731421
A novel kind of punctured polar codes is proposed in this paper. The codes are constructed by certain constraints on both…
Expand
Highly Cited
2011
Highly Cited
2011
Portfolio: finding relevant functions and their usage
Collin McMillan
,
M. Grechanik
,
D. Poshyvanyk
,
Qing Xie
,
Chen Fu
International Conference on Software Engineering
2011
Corpus ID: 11339499
Different studies show that programmers are more interested in finding definitions of functions and their uses than variables…
Expand
Highly Cited
2008
Highly Cited
2008
Preventing Memory Error Exploits with WIT
P. Akritidis
,
Cristian Cadar
,
C. Raiciu
,
Manuel Costa
,
M. Castro
IEEE Symposium on Security and Privacy
2008
Corpus ID: 2162837
Attacks often exploit memory errors to gain control over the execution of vulnerable programs. These attacks remain a serious…
Expand
Highly Cited
2006
Highly Cited
2006
FlexCup: A Flexible and Efficient Code Update Mechanism for Sensor Networks
P. Marrón
,
M. Gauger
,
A. Lachenmann
,
D. Minder
,
O. Saukh
,
K. Rothermel
European Conference/Workshop on Wireless Sensor…
2006
Corpus ID: 8570895
The ability to update the program code installed on wireless sensor nodes plays an import role in the highly dynamic environments…
Expand
Highly Cited
2005
Highly Cited
2005
Reduced dynamic orbit determination using GPS code and carrier measurements
O. Montenbruck
,
T. Helleputte
,
R. Kroes
,
E. Gill
2005
Corpus ID: 55321212
Highly Cited
1998
Highly Cited
1998
Classification of seismic signals by integrating ensembles of neural networks
Y. Shimshoni
,
N. Intrator
IEEE Transactions on Signal Processing
1998
Corpus ID: 15333782
We examine a classification problem in which seismic waveforms of natural earthquakes are to be distinguished from waveforms of…
Expand
Highly Cited
1996
Highly Cited
1996
Network constraints and multi-objective optimization for one-class classification
M. M. Moya
,
D. Hush
Neural Networks
1996
Corpus ID: 5414403
Highly Cited
1994
Highly Cited
1994
Radiation effects in ceramics
L. Hobbs
,
F. Clinard
,
S. Zinkle
,
R. Ewing
1994
Corpus ID: 53694896
Highly Cited
1994
Highly Cited
1994
Boosting the Performance of RBF Networks with Dynamic Decay Adjustment
M. Berthold
,
J. Diamond
Neural Information Processing Systems
1994
Corpus ID: 2388596
Radial Basis Function (RBF) Networks, also known as networks of locally-tuned processing units (see [6]) are well known for their…
Expand
Highly Cited
1992
Highly Cited
1992
GENOA - A Customizable, Language- And Front-end Independent Code Analyzer
Premkumar T. Devanbu
International Conference on Software Engineering
1992
Corpus ID: 2922507
Programmers working on large software systems spend a great deal of time examining code and trying to understand it. Code…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE