Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,088,321 papers from all fields of science
Search
Sign In
Create Free Account
Arbitrary code execution
Known as:
Arbitrary code
, RCE
, Remote code execution
In computer security, "arbitrary code execution" is used to describe an attacker's ability to execute any command of the attacker's choice on a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
28 relations
Adobe Flash
Adobe Flash Player
Bash
Branch (computer science)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2009
2009
Assembly Design and Evaluation Based on Bare-Hand Interaction in an Augmented Reality Environment
Zhenbiao Wang
,
Yan Shen
,
S. Ong
,
A. Nee
International Conference on Cyberworlds
2009
Corpus ID: 20852543
Augmented Reality (AR) is an increasingly important application domain for computer graphics and user interface design. In this…
Expand
Highly Cited
2006
Highly Cited
2006
Unrestricted Transactional Memory: Supporting I/O and System Calls Within Transactions
Comments Comments
,
Colin Blundell
,
E. Lewis
,
Milo M. K. Martin
2006
Corpus ID: 1005509
Hardware transactional memory has great potential to simplify the creation of correct and efficient multithreaded programs…
Expand
Highly Cited
2006
Highly Cited
2006
Application layer intrusion detection for SQL injection
Frank S. Rietta
ACM-SE 44
2006
Corpus ID: 13901704
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While…
Expand
2006
2006
A class of irregular LDPC codes with low error floor and low encoding complexity
Zhiyong He
,
P. Fortier
,
S. Roy
IEEE Communications Letters
2006
Corpus ID: 17222836
In this letter, we propose a class of irregular structured low-density parity-check (LDPC) codes with low error floor and low…
Expand
Highly Cited
2003
Highly Cited
2003
Microwave Applications of Photonic Crystals
E. Ozbay
,
B. Temelkuran
,
M. Bayindir
2003
Corpus ID: 59399707
We have demonstrated guiding and bending of electromagnetic (EM) waves in planar and coupled-cavity waveguides built around three…
Expand
2000
2000
On the Nonuniform Deformation of the Cylinder Compression Test
F. Chen
,
ChengJun Chen
2000
Corpus ID: 53360577
A theoretical model based on Hills general method is developed in the present study to calculate the flow stress in a cylindrical…
Expand
1999
1999
T-User Code with Arbitrary Code Length for Multiple-Access Adder Channel (Special Section on Information Theory and Its Applications)
Jun Cheng
,
Y. Watanabe
1999
Corpus ID: 60183560
1997
1997
Applying Mobile Code to Distributed Systems
David Halls
1997
Corpus ID: 53909962
Use of mobile code can make distributed systems and the abstractions they provide more exible to build and use. Richer…
Expand
1992
1992
Tight bounds on the redundancy of Huffman codes
D. Manstetten
IEEE Transactions on Information Theory
1992
Corpus ID: 52849364
A method for deriving optimal upper bounds on the redundancy of binary Huffman codes in terms of the probability p/sub 1/ of the…
Expand
1977
1977
A Lemma Driven Automatic Theorem Prover for Recursive Function Theory
R. Boyer
,
J. S. Moore
International Joint Conference on Artificial…
1977
Corpus ID: 12122083
We describe work in progress on an automatic theorem prover for recursive function theory that we intend to apply in the analysis…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE