Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,250,725 papers from all fields of science
Search
Sign In
Create Free Account
Exploit kit
Known as:
Exploit kits
An exploit kit is a software kit designed to run on web servers, with the purpose of identifying software vulnerabilities in client machines…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Backdoor (computing)
Blackhole exploit kit
Botnet
Client (computing)
Expand
Broader (1)
Spyware
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript
Aurore Fass
,
Robert P. Krawczyk
,
M. Backes
,
Ben Stock
International Conference on Detection of…
2018
Corpus ID: 49342358
JavaScript is a browser scripting language initially created to enhance the interactivity of web sites and to improve their user…
Expand
2014
2014
Investors’ Reaction to the Implementation of Corporate Governance Mechanisms
N. Bhutta
,
S. Shah
2014
Corpus ID: 36534324
The study investigates the impact of corporate governance on investor reaction. This is the first study till date that addresses…
Expand
2014
2014
PExy: The Other Side of Exploit Kits
G. Maio
,
A. Kapravelos
,
Yan Shoshitaishvili
,
Christopher Krügel
,
Giovanni Vigna
International Conference on Detection of…
2014
Corpus ID: 7510089
The drive-by download scene has changed dramatically in the last few years. What was a disorganized ad-hoc generation of…
Expand
Highly Cited
2013
Highly Cited
2013
Agricultural productivity and greenhouse gas emissions: trade-offs or synergies between mitigation and food security?
H. Valin
,
P. Havlík
,
A. Mosnier
,
M. Herrero
,
E. Schmid
,
M. Obersteiner
2013
Corpus ID: 29755661
In this letter, we investigate the effects of crop yield and livestock feed efficiency scenarios on greenhouse gas (GHG…
Expand
Highly Cited
2013
Highly Cited
2013
Anatomy of Exploit Kits - Preliminary Analysis of Exploit Kits as Software Artefacts
V. Kotov
,
F. Massacci
Engineering Secure Software and Systems
2013
Corpus ID: 15862892
In this paper we report a preliminary analysis of the source code of over 30 different exploit kits which are the main tool…
Expand
Highly Cited
2012
Highly Cited
2012
Manufacturing compromise: the emergence of exploit-as-a-service
Chris Grier
,
L. Ballard
,
+15 authors
G. Voelker
Conference on Computer and Communications…
2012
Corpus ID: 1020110
We investigate the emergence of the exploit-as-a-service model for driveby browser compromise. In this regime, attackers pay for…
Expand
2010
2010
Improving Determinization in Hindsight for On-line Probabilistic Planning
S. Yoon
,
Wheeler Ruml
,
J. Benton
,
M. Do
International Conference on Automated Planning…
2010
Corpus ID: 15127567
Recently, "determinization in hindsight" has enjoyed surprising success in on-line probabilistic planning. This technique…
Expand
2008
2008
Quasi-static scheduling for safe futures
Armand Navabi
,
X. Zhang
,
S. Jagannathan
ACM SIGPLAN Symposium on Principles & Practice of…
2008
Corpus ID: 175864
Migrating sequential programs to effectively utilize next generation multicore architectures is a key challenge facing…
Expand
Highly Cited
1999
Highly Cited
1999
Business: Strategic development of the usability engineering function
Deborah J. Mayhew
INTR
1999
Corpus ID: 41376890
business W Let's imagine that you have decided to act as the usability champion in your product development organization…
Expand
Highly Cited
1985
Highly Cited
1985
A fully parallel algorithm for the symmetric eigenvalue problem
J. Dongarra
,
D. Sorensen
SIAM Conference on Parallel Processing for…
1985
Corpus ID: 5506256
In this paper we present a parallel algorithm for the symmetric algebraic eigenvalue problem. The algorithm is based upon a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE