Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,378,868 papers from all fields of science
Search
Sign In
Create Free Account
Shellcode
Known as:
Bindshell
, Null-free shellcode
, Shell code
In hacking, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
41 relations
Address space layout randomization
Alphanumeric shellcode
Arbitrary code execution
Buffer overflow
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Analysis of the Infection and the Injection Phases of the Telnet Botnets
Tomáš Bajtoš
,
Pavol Sokol
,
A. Gajdos
,
K. Lučivjanská
,
Terézia Mézesová
Journal of universal computer science (Online)
2019
Corpus ID: 209184231
With the number of Internet of Things devices increasing, also the number of vulnerable devices connected to the Internet…
Expand
2015
2015
The Research on Security Reinforcement of Android Applications
X. Feng
,
Jun Lin
,
Shizhun Jia
International Congress of Mathematicans
2015
Corpus ID: 73640902
Along with the rapid progress and widely used of mobile application, security protection to software application has become an…
Expand
2015
2015
Preventing malicious attacks by diversifying Linux shell commands
J. Uitto
,
Sampsa Rauti
,
Jari-Matti Mäkelä
,
Ville Leppänen
Symposium on Programming Languages and Software…
2015
Corpus ID: 17005808
. In instruction set diversification, a ”language” used in a sys-tem is uniquely diversified in order to protect software against…
Expand
2013
2013
WORLDWIDE OBSERVATORY OF MALICIOUS BEHAVIORS AND ATTACK THREATS
H. Bos
2013
Corpus ID: 58025893
This deliverable reports the deployment of all types of sensors implemented in the WOMBAT project and includes descriptions of…
Expand
2011
2011
Exploiting Format Strings With Python
C. Wright
2011
Corpus ID: 215887167
In this article we will look at format strings in the C and C++ programming languages. In particular, how these may be abused…
Expand
2010
2010
Mahalanobis Distance Map Approach for Anomaly Detection
Aruna Jamdagni
,
Aruna Jamdagni
,
Zhiyuan Tan
,
P. Nanda
,
Xiangjian He
,
R. Liu
Australian Information Security Management…
2010
Corpus ID: 18239979
Web servers and web-based applications are commonly used as attack targets. The main issues are how to prevent unauthorised…
Expand
2009
2009
A Web Page Malicious Code Detect Approach Based on Script Execution
Zhi-Yong Li
,
R. Tao
,
Zhenquan Cai
,
H. Zhang
Fifth International Conference on Natural…
2009
Corpus ID: 22607590
Web page malicious code detection is a crucial aspect of Internet security. Current web page malicious codes detection work by…
Expand
2009
2009
Software license embedded in the shell code
ピーター・チェン
2009
Corpus ID: 155151818
Software application protection method and system for protecting and check the license of the original application. The system…
Expand
2006
2006
OverfiowDungeon:A Novel Overflow Attack Prevention System
Lu Xian
2006
Corpus ID: 63965336
Overflow attack does the broadest harm to network applications.There are techniques which can prevent the kind of attack.However…
Expand
1979
1979
K-FIX (3D). 3D Extension 2-Phase Flow Dynamics
W. Rivard
,
Torrey
1979
Corpus ID: 59684910
This package consists of two programs K-FIX(3D) and K-FIX(3D,FLX) which extend the transient, two-dimensional, two-fluid program…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE