Skip to search formSkip to main contentSkip to account menu

Arbitrary code execution

Known as: Arbitrary code, RCE, Remote code execution 
In computer security, "arbitrary code execution" is used to describe an attacker's ability to execute any command of the attacker's choice on a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2009
2009
Augmented Reality (AR) is an increasingly important application domain for computer graphics and user interface design. In this… 
Highly Cited
2006
Highly Cited
2006
Hardware transactional memory has great potential to simplify the creation of correct and efficient multithreaded programs… 
Highly Cited
2006
Highly Cited
2006
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While… 
2006
2006
In this letter, we propose a class of irregular structured low-density parity-check (LDPC) codes with low error floor and low… 
Highly Cited
2003
Highly Cited
2003
We have demonstrated guiding and bending of electromagnetic (EM) waves in planar and coupled-cavity waveguides built around three… 
2000
2000
A theoretical model based on Hills general method is developed in the present study to calculate the flow stress in a cylindrical… 
1997
1997
Use of mobile code can make distributed systems and the abstractions they provide more exible to build and use. Richer… 
1992
1992
A method for deriving optimal upper bounds on the redundancy of binary Huffman codes in terms of the probability p/sub 1/ of the… 
1977
1977
We describe work in progress on an automatic theorem prover for recursive function theory that we intend to apply in the analysis…