咨询与建议

限定检索结果

文献类型

  • 109 篇 期刊文献
  • 25 篇 会议
  • 19 篇 学位论文

馆藏范围

  • 153 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 145 篇 工学
    • 98 篇 计算机科学与技术...
    • 71 篇 网络空间安全
    • 48 篇 软件工程
    • 11 篇 电气工程
    • 8 篇 信息与通信工程
    • 5 篇 电子科学与技术(可...
    • 5 篇 控制科学与工程
    • 4 篇 仪器科学与技术
    • 1 篇 机械工程
    • 1 篇 地质资源与地质工...
    • 1 篇 环境科学与工程(可...
  • 13 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 1 篇 理学
    • 1 篇 化学
    • 1 篇 生物学

主题

  • 153 篇 shellcode
  • 33 篇 缓冲区溢出
  • 13 篇 漏洞
  • 12 篇 exploit
  • 9 篇 堆栈
  • 6 篇 machine learning
  • 6 篇 缓冲区溢出攻击
  • 6 篇 溢出
  • 5 篇 编写
  • 5 篇 程序设计
  • 5 篇 windows系统
  • 5 篇 网络安全
  • 5 篇 malware
  • 5 篇 windows
  • 5 篇 polymorphism
  • 5 篇 缓冲区
  • 4 篇 指南
  • 4 篇 dos attack
  • 4 篇 vulnerability
  • 4 篇 artificial immun...

机构

  • 9 篇 上海交通大学
  • 5 篇 解放军信息工程大...
  • 4 篇 北京邮电大学
  • 3 篇 kanagawa inst te...
  • 3 篇 江南计算技术研究...
  • 2 篇 kanagawa institu...
  • 2 篇 univ calcutta de...
  • 2 篇 江苏大学
  • 2 篇 同济大学
  • 2 篇 columbia univ de...
  • 2 篇 kanagawa inst te...
  • 2 篇 信息工程大学
  • 2 篇 公安部第三研究所...
  • 2 篇 哈尔滨工程大学
  • 2 篇 univ naples fede...
  • 1 篇 华中科技大学
  • 1 篇 yazd univ dept e...
  • 1 篇 大连理工大学
  • 1 篇 北京交通大学
  • 1 篇 中国人民解放军信...

作者

  • 7 篇 okamoto takeshi
  • 6 篇 ww0830
  • 6 篇 王炜
  • 4 篇 薛质
  • 4 篇 tarao mitsunobu
  • 3 篇 xue zhi
  • 3 篇 takeshi okamoto
  • 3 篇 池瑞楠
  • 2 篇 徐启杰
  • 2 篇 罗鸿彦
  • 2 篇 kim ikkyun
  • 2 篇 古开元
  • 2 篇 杨洋
  • 2 篇 song yingbo
  • 2 篇 cotroneo domenic...
  • 2 篇 wang yijun
  • 2 篇 shaikh samira
  • 2 篇 shu hui
  • 2 篇 natella roberto
  • 2 篇 杨明豪

语言

  • 111 篇 中文
  • 41 篇 英文
  • 1 篇 其他
检索条件"主题词=shellcode"
153 条 记 录,以下是1-10 订阅
排序:
Identification of Arbitrary Length shellcode for the Intel x64 Architecture as a NOP Sled
收藏 引用
IEEE ACCESS 2025年 13卷 65438-65454页
作者: Norby, Austin Rimal, Bhaskar P. Brizendine, Bramwell Bogart Associates Northern Virginia Reston VA 20190 USA Univ Idaho Dept Comp Sci Moscow ID 83844 USA Univ Alabama Huntsville Dept Comp Sci Huntsville AL 35899 USA
A NOP (no-operation) sled is used as part of binary exploitation code to provide flexibility for exploitation accuracy and evade signatures before and after the exploitation has occurred and to transfer execution to t... 详细信息
来源: 评论
shellcode Detection in IPv6 Networks with HoneydV6  11
Shellcode Detection in IPv6 Networks with HoneydV6
收藏 引用
11th International Conference on Security and Cryptography (SECRYPT)
作者: Schindler, Sven Eggert, Oliver Schnor, Bettina Scheffler, Thomas Univ Potsdam Dept Comp Sci Potsdam Germany Beuth Univ Appl Sci Dept Elect Engn Berlin Germany
More and more networks and services are reachable via IPv6 and the interest for security monitoring of these IPv6 networks is increasing. Honeypots are valuable tools to monitor and analyse network attacks. HoneydV6 i... 详细信息
来源: 评论
shellcode Detector for Malicious Document Hunting
Shellcode Detector for Malicious Document Hunting
收藏 引用
IEEE Conference on Dependable and Secure Computing
作者: Chen, Chong-Kuan Lan, Shen-Chieh Shieh, Shiuhpyng Winston Natl Chiao Tung Univ Dept Comp Sci Hsinchu Taiwan
Advanced Persistent Threat (APT) attacks became a major network threat in recent years. Among APT attack techniques, sending a phishing email with malicious documents attached is considered one of the most effective o... 详细信息
来源: 评论
A robust software watermarking framework using shellcode
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2020年 第3-4期79卷 2555-2576页
作者: Dey, Ayan Ghosh, Shibashis Bhattacharya, Sukriti Chaki, Nabendu Univ Calcutta AK Choudhury Sch IT Kolkata India LIST Environm Informat Dept Environm Res & Innovat ERIN Luxembourg Luxembourg Univ Calcutta Dept Comp Sci & Engn Kolkata India
Watermarks have long been applied to ensure the authenticity of media contents. Computer software is an intellectual outcome in the digital domain. Therefore, it has to face all the common threats like illegal redistr... 详细信息
来源: 评论
Tracing stored program counter to detect polymorphic shellcode
收藏 引用
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS 2008年 第8期E91D卷 2192-2195页
作者: Kim, Daewon Kim, Ikkyun Oh, Jintae Jang, Jongsoo Elect & Telecommun Res Inst Informat Secur Res Div Taejon 305350 South Korea
The shellcode use of the polymorphic form has become active as the de facto method for avoiding signature based network security system. We present a new static analysis method for detecting the decryption routine of ... 详细信息
来源: 评论
On the infeasibility of modeling polymorphic shellcode Re-thinking the role of learning in intrusion detection systems
收藏 引用
MACHINE LEARNING 2010年 第2期81卷 179-205页
作者: Song, Yingbo Locasto, Michael E. Stavrou, Angelos Keromytis, Angelos D. Stolfo, Salvatore J. Columbia Univ Dept Comp Sci New York NY 10027 USA George Mason Univ Dept Comp Sci Fairfax VA 22030 USA
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed into semantically equivalent variants f... 详细信息
来源: 评论
SecondDEP: Resilient Computing that Prevents shellcode Execution in Cyber-Attacks  19th
SecondDEP: Resilient Computing that Prevents Shellcode Execu...
收藏 引用
19th International Conference on Knowledge Based and Intelligent Information and Engineering Systems (KES)
作者: Okamoto, Takeshi Kanagawa Inst Technol Atsugi Kanagawa 2430292 Japan
This paper proposes a novel method of preventing shellcode execution even if DEP is bypassed. The method prevents Windows APIs from calling on a data area by API hooking, based on evidence that shellcode is executed i... 详细信息
来源: 评论
Accurate shellcode Recognition from Network Traffic Data using Artificial Neural Nets  28
Accurate Shellcode Recognition from Network Traffic Data usi...
收藏 引用
IEEE 28th Canadian Conference on Electrical and Computer Engineering (CCECE)
作者: Onotu, Patrick Day, David Rodrigues, Marcos A. Sheffield Hallam Univ Automat & Control Engn Sheffield S1 1WB S Yorkshire England Sheffield Hallam Univ Sheffield S1 1WB S Yorkshire England
This paper presents an approach to shellcode recognition directly from network traffic data using a multi-layer perceptron with back-propagation learning algorithm. Using raw network data composed of a mixture of shel... 详细信息
来源: 评论
English shellcode  09
English Shellcode
收藏 引用
16th ACM Conference on Computer and Communications Security
作者: Mason, Joshua Small, Sam Monrose, Fabian MacManus, Greg Johns Hopkins Univ Baltimore MD 21218 USA
History indicates that the security community commonly takes a divide-and-conquer approach to battling malware threats identify the essential and inalienable components of an attack, then develop detection and prevent... 详细信息
来源: 评论
k-Depth Mimicry Attack to Secretly Embed shellcode into PDF Files  8th
<i>k</i>-Depth Mimicry Attack to Secretly Embed Shellcode in...
收藏 引用
iCatse International Conference on Information Science and Applications (ICISA)
作者: Park, Jaewoo Kim, Hyoungshick Sungkyunkwan Univ Dept Software Suwon 2066 South Korea
This paper revisits the shellcode embedding problem for PDF files. We found that a popularly used shellcode embedding technique called reverse mimicry attack has not been shown to be effective against well-trained sta... 详细信息
来源: 评论