Shellcode

Known as: Bindshell, Null-free shellcode, Shell code 
In hacking, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Developing a remote exploit is not easy. It requires a comprehensive understanding of a vulnerability and delicate techniques to… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2014
2014
Signal handling has been an integral part of UNIX systems since the earliest implementation in the 1970s. Nowadays, we find… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Is this relevant?
2013
2013
Although several research teams have focused on binary code injection, it is still an unsolved problem. Misuse-based detection… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Is this relevant?
2012
2012
JavaScript (JS) based shellcode injections are among the most dangerous attacks to computer systems. Existing approaches have… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
2011
2011
Exploiting recent advances in monitoring technology and the drop of its costs, authoritarian and oppressive regimes are… (More)
  • figure 2
  • figure 2
  • table I
  • figure 2
Is this relevant?
2010
2010
Malicious shellcodes are segments of binary code disguised as normal input data. Such shellcodes can be injected into a target… (More)
Is this relevant?
2010
2010
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious… (More)
  • figure 2
  • figure 5
  • table 1
  • figure 6
  • figure 7
Is this relevant?
2009
2009
History indicates that the security community commonly takes a divide-and-conquer approach to battling malware threats: identify… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Network-level emulation has recently been proposed as a method for the accurate detection of previously unknown polymorphic code… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?