Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Shellcode

Known as: Bindshell, Null-free shellcode, Shell code 
In hacking, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
This paper presents a novel approach to detection of malicious network traffic using artificial neural networks suitable for use… Expand
  • figure 1
  • figure 2
  • figure 3
  • table II
  • table I
2017
2017
Developing a remote exploit is not easy. It requires a comprehensive understanding of a vulnerability and delicate techniques to… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2014
Highly Cited
2014
  • E. Bosman, H. Bos
  • IEEE Symposium on Security and Privacy
  • 2014
  • Corpus ID: 6153855
Signal handling has been an integral part of UNIX systems since the earliest implementation in the 1970s. Nowadays, we find… Expand
  • figure 2
  • table I
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2010
Highly Cited
2010
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web… Expand
  • table 1
  • table 2
  • figure 2
  • figure 1
Highly Cited
2009
Highly Cited
2009
Smartphones started being targets for malware in June 2004 while malware count increased steadily until the introduction of a… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Highly Cited
2009
Highly Cited
2009
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious… Expand
  • figure 2
  • figure 5
  • table 1
  • figure 6
  • figure 7
2009
2009
Web page malicious code detection is a crucial aspect of Internet security. Current web page malicious codes detection work by… Expand
  • figure 3
  • figure 4
  • figure 2
  • figure 5
  • figure 6
Highly Cited
2007
Highly Cited
2007
Network-level emulation has recently been proposed as a method for the accurate detection of previously unknown polymorphic code… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2006
Highly Cited
2006
Significant progress has been made in recent years towards preventing code injection attacks at the network level. However, as… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
2004
2004
  • I. Arce
  • IEEE Secur. Priv.
  • 2004
  • Corpus ID: 840465
We can build an entire taxonomy of attacks on network security by understanding exploitation programs, which take advantage of… Expand