Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Shellcode

Known as: Bindshell, Null-free shellcode, Shell code 
In hacking, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Developing a remote exploit is not easy. It requires a comprehensive understanding of a vulnerability and delicate techniques to… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2014
Highly Cited
2014
  • E. Bosman, H. Bos
  • IEEE Symposium on Security and Privacy
  • 2014
  • Corpus ID: 6153855
Signal handling has been an integral part of UNIX systems since the earliest implementation in the 1970s. Nowadays, we find… Expand
  • figure 2
  • table I
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large feature set to discriminate normal… Expand
  • figure 1
  • figure 2
  • table 2
  • figure 3
  • table 3
Is this relevant?
Highly Cited
2010
Highly Cited
2010
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web… Expand
  • table 1
  • table 2
  • figure 2
  • figure 1
Is this relevant?
2010
2010
In this paper, we present the density, {rho}, velocity dispersion, {sigma}, and {rho}/{sigma}{sup 3} profiles of isotropic… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Smartphones started being targets for malware in June 2004 while malware count increased steadily until the introduction of a… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious… Expand
  • figure 2
  • figure 5
  • table 1
  • figure 6
  • figure 7
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Significant progress has been made in recent years towards preventing code injection attacks at the network level. However, as… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2005
2005
In a C compiler, function calls are difficult to implement correctly because they must respect a platform-specific calling… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
2004
2004
  • I. Arce
  • IEEE Secur. Priv.
  • 2004
  • Corpus ID: 840465
We can build an entire taxonomy of attacks on network security by understanding exploitation programs, which take advantage of… Expand
Is this relevant?