Cart (Loading....) | Create Account
Close category search window

The shellcode generation

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
1 Author(s)
Arce, I. ; Core Security Technol., Boston, MA, USA

We can build an entire taxonomy of attacks on network security by understanding exploitation programs, which take advantage of bugs in software running on vulnerable systems, these programs' technical capabilities and their connection to those who develop and use them. For the past decade, exploit tools have signaled the evolution of a community of adversaries comprising numerous inexperienced and unskilled attackers commonly referred to as script kiddies, and a few experienced, technically savvy attackers. Exploit programs are tell-tale signs of attackers' sophistication: if studied meticulously, they can provide insight into current and future trends.

Published in:

Security & Privacy, IEEE  (Volume:2 ,  Issue: 5 )

Date of Publication:

Sept.-Oct. 2004

Need Help?

IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.