Skip to search formSkip to main contentSkip to account menu

Shellcode

Known as: Bindshell, Null-free shellcode, Shell code 
In hacking, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
With the number of Internet of Things devices increasing, also the number of vulnerable devices connected to the Internet… 
2015
2015
Along with the rapid progress and widely used of mobile application, security protection to software application has become an… 
2015
2015
. In instruction set diversification, a ”language” used in a sys-tem is uniquely diversified in order to protect software against… 
2014
2014
Tasks are selectively migrated to the cloud with the widespread adoption of the cloud computing platform, but the user cannot… 
2013
2013
  • Jing-Yao LinH. Pao
  • 2013
  • Corpus ID: 15411513
Malicious document is one of the most notorious components of modern attacks. The document may appear normal in its format, but… 
2013
2013
This deliverable reports the deployment of all types of sensors implemented in the WOMBAT project and includes descriptions of… 
2012
2012
Internet-borne threats have evolved from easy to detect denial of service attacks to zero-day exploits used for targeted… 
Review
2012
Review
2012
Buffer overflow attack is most common and dangerous attack method at present. So the analysis is useful in studying the principle… 
2009
2009
Web page malicious code detection is a crucial aspect of Internet security. Current web page malicious codes detection work by… 
Review
2007
Review
2007
This paper presents ViSe, a virtual security testbed, and demonstrates how it can be used to efficiently study computer attacks…