Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,292,409 papers from all fields of science
Search
Sign In
Create Free Account
Shellcode
Known as:
Bindshell
, Null-free shellcode
, Shell code
In hacking, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
41 relations
Address space layout randomization
Alphanumeric shellcode
Arbitrary code execution
Buffer overflow
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Analysis of the Infection and the Injection Phases of the Telnet Botnets
Tomáš Bajtoš
,
Pavol Sokol
,
A. Gajdos
,
K. Lučivjanská
,
Terézia Mézesová
Journal of universal computer science (Online)
2019
Corpus ID: 209184231
With the number of Internet of Things devices increasing, also the number of vulnerable devices connected to the Internet…
Expand
2015
2015
The Research on Security Reinforcement of Android Applications
X. Feng
,
Jun Lin
,
Shizhun Jia
International Congress of Mathematicans
2015
Corpus ID: 73640902
Along with the rapid progress and widely used of mobile application, security protection to software application has become an…
Expand
2015
2015
Preventing malicious attacks by diversifying Linux shell commands
J. Uitto
,
Sampsa Rauti
,
Jari-Matti Mäkelä
,
Ville Leppänen
Symposium on Programming Languages and Software…
2015
Corpus ID: 17005808
. In instruction set diversification, a ”language” used in a sys-tem is uniquely diversified in order to protect software against…
Expand
2014
2014
Computation Integrity Measurement Based on Branch Transfer
Jianming Fu
,
Yan Lin
,
Xu Zhang
,
Pengwei Li
IEEE 13th International Conference on Trust…
2014
Corpus ID: 15363078
Tasks are selectively migrated to the cloud with the widespread adoption of the cloud computing platform, but the user cannot…
Expand
2013
2013
Multi-view Malicious Document Detection
Jing-Yao Lin
,
H. Pao
Conference on Technologies and Applications of…
2013
Corpus ID: 15411513
Malicious document is one of the most notorious components of modern attacks. The document may appear normal in its format, but…
Expand
2013
2013
WORLDWIDE OBSERVATORY OF MALICIOUS BEHAVIORS AND ATTACK THREATS
H. Bos
2013
Corpus ID: 58025893
This deliverable reports the deployment of all types of sensors implemented in the WOMBAT project and includes descriptions of…
Expand
2012
2012
NetGator: Malware Detection Using Program Interactive Challenges
Brian Schulte
,
Haris Andrianakis
,
Kun Sun
,
A. Stavrou
International Conference on Detection of…
2012
Corpus ID: 17111193
Internet-borne threats have evolved from easy to detect denial of service attacks to zero-day exploits used for targeted…
Expand
Review
2012
Review
2012
Buffer Overflow Exploit and Defensive Techniques
Desheng Fu
,
Feiyue Shi
Fourth International Conference on Multimedia…
2012
Corpus ID: 41074172
Buffer overflow attack is most common and dangerous attack method at present. So the analysis is useful in studying the principle…
Expand
2009
2009
A Web Page Malicious Code Detect Approach Based on Script Execution
Zhi-Yong Li
,
R. Tao
,
Zhenquan Cai
,
H. Zhang
Fifth International Conference on Natural…
2009
Corpus ID: 22607590
Web page malicious code detection is a crucial aspect of Internet security. Current web page malicious codes detection work by…
Expand
Review
2007
Review
2007
Using a virtual security testbed for digital forensic reconstruction
André Årnes
,
Paul Haas
,
Giovanni Vigna
,
R. Kemmerer
Journal in Computer Virology
2007
Corpus ID: 6033765
This paper presents ViSe, a virtual security testbed, and demonstrates how it can be used to efficiently study computer attacks…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE