메뉴 건너뛰기




Volumn , Issue , 2009, Pages 524-533

English shellcode

Author keywords

Natural language; Network emulation; Shellcode

Indexed keywords

BUFFER OVERFLOW ATTACKS; CODE INJECTION ATTACKS; COMMODITY HARDWARE; DIVIDE-AND-CONQUER APPROACH; ENCODING TECHNIQUES; ESSENTIAL COMPONENT; MALWARES; NATURAL LANGUAGES; PREVENTIVE MEASURES; PRIMARY OBJECTIVE; SECURITY COMMUNITY; SHELLCODE;

EID: 74049102282     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1653662.1653725     Document Type: Conference Paper
Times cited : (68)

References (27)
  • 5
    • 33644565261 scopus 로고    scopus 로고
    • Polymorphic Shellcode Engine Using Spectrum Analysis
    • August
    • T. Detristan, T. Ulenspiegel, Y. Malcom, and M. S. V. Underduk. Polymorphic Shellcode Engine Using Spectrum Analysis. Phrack, 11(61), August 2003.
    • (2003) Phrack , vol.11 , Issue.61
    • Detristan, T.1    Ulenspiegel, T.2    Malcom, Y.3    Underduk, M.S.V.4
  • 6
    • 14844288825 scopus 로고    scopus 로고
    • Bypassing PaX ASLR Protection
    • July
    • T. Durden. Bypassing PaX ASLR Protection. Phrack, 11(59), July 2002.
    • (2002) Phrack , vol.11 , Issue.59
    • Durden, T.1
  • 7
    • 74049147273 scopus 로고    scopus 로고
    • K2. ADMmutate. See http://www.ktwo.ca/c/ADMmutate-0.8.4.tar.gz.
    • K2. ADMmutate. See
  • 9
    • 31844441673 scopus 로고    scopus 로고
    • Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic
    • Technical Report GIT-CC-05-09, Georgia Institute of Technology
    • O. Kolesnikov, D. Dagon, and W. Lee. Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic. Technical Report GIT-CC-05-09, Georgia Institute of Technology, 2005.
    • (2005)
    • Kolesnikov, O.1    Dagon, D.2    Lee, W.3
  • 10
    • 74049133723 scopus 로고    scopus 로고
    • Punk Ode: Hiding Shellcode in Plain Sight
    • G. MacManus and M. Sutton. Punk Ode: Hiding Shellcode in Plain Sight. In Black Hat USA, 2006.
    • (2006) Black Hat USA
    • MacManus, G.1    Sutton, M.2
  • 11
    • 33746464030 scopus 로고    scopus 로고
    • Building IA32 Unicode-Proof Shellcodes
    • August
    • Obscou. Building IA32 Unicode-Proof Shellcodes. Phrack, 11(61), August 2003.
    • (2003) Phrack , vol.11 , Issue.61
    • Obscou1
  • 12
    • 0006100649 scopus 로고    scopus 로고
    • Smashing The Stack For Fun And Profit
    • November
    • A. One. Smashing The Stack For Fun And Profit. Phrack, 7(49), November 1996.
    • (1996) Phrack , vol.7 , Issue.49
    • One, A.1
  • 18
    • 38149098941 scopus 로고    scopus 로고
    • Writing IA32 Alphanumeric Shellcode
    • August
    • Rix. Writing IA32 Alphanumeric Shellcode. Phrack, 11(57), August 2001.
    • (2001) Phrack , vol.11 , Issue.57
    • Rix1
  • 21
    • 78650018752 scopus 로고    scopus 로고
    • Bypassing Browser Memory Protections
    • A. Sotirov and M. Dowd. Bypassing Browser Memory Protections. In Black Hat USA, 2008.
    • (2008) Black Hat USA
    • Sotirov, A.1    Dowd, M.2
  • 24
    • 84935113569 scopus 로고    scopus 로고
    • A. J. Viterbi. Error Bounds for Convolutional Codes and an Asymptotically Optimum Decoding Algorithm. IEEE Transactions on Information Theory, 13(2):260-269, April 1967.
    • A. J. Viterbi. Error Bounds for Convolutional Codes and an Asymptotically Optimum Decoding Algorithm. IEEE Transactions on Information Theory, 13(2):260-269, April 1967.
  • 25
    • 74049136897 scopus 로고    scopus 로고
    • Writing UTF-8 compatible shellcodes
    • July
    • T. Wana. Writing UTF-8 compatible shellcodes. Phrack, 11(62), July 2004.
    • (2004) Phrack , vol.11 , Issue.62
    • Wana, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.