The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for shellcode with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2004-2008 (15) 2009-2012 (15) 2013-2018 (15) 2019-2023 (8)
Publication types (Num. hits)
article(14) inproceedings(39)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 26 occurrences of 22 keywords

Results
Found 53 publication records. Showing 53 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
236Joshua Mason, Sam Small, Fabian Monrose, Greg MacManus English shellcode. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF shellcode, natural language, network emulation
155Lanjia Wang, Hai-Xin Duan, Xing Li 0001 Dynamic emulation based modeling and detection of polymorphic shellcode at the network level. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF polymorphic shellcode, CPU emulation, intrusion detection
134Hsiang-Lun Huang, Tzong-Jye Liu, Kuong-Ho Chen, Chyi-Ren Dow, Lih-Chyau Wuu A polymorphic shellcode detection mechanism in the network. Search on Bibsonomy Infoscale The full citation details ... 2007 DBLP  DOI  BibTeX  RDF polymorphic shellcode, intrusion detection system, buffer overflow
108Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos Network-level polymorphic shellcode detection using emulation. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
107Manuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malicious script, shellcode, emulation, Drive-by download
102Makoto Shimamura, Kenji Kono Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Network-level code emulation, Memory-scanning attack, Intrusion detection, Code-injection attack, Intrusion analysis
93Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo On the infeasibility of modeling polymorphic shellcode. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF shellcode, polymorphism, statistical models, signature generation
93Udo Payer, Peter Teufl, Mario Lamberger Hybrid Engine for Polymorphic Shellcode Detection. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF polymorphic shellcode detection, neural networks, Intrusion Detection
87Yves Younan, Pieter Philippaerts, Frank Piessens, Wouter Joosen, Sven Lachmund, Thomas Walter 0001 Filter-resistant code injection on ARM. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF alphanumeric shellcode, filter-resistance, turing completeness
68Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos Network-Level Polymorphic Shellcode Detection Using Emulation. Search on Bibsonomy DIMVA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
66Udo Payer, Stefan Kraxberger Polymorphic Code Detection with GA Optimized Markov Models. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF polymorphic shellcode detection, genetic algorithms, optimization, intrusion detection, markov models
47Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos Emulation-Based Detection of Non-self-contained Polymorphic Shellcode. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Michalis Foukarakis, Demetres Antoniades, Michalis Polychronakis Deep packet anonymization. Search on Bibsonomy EUROSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
41Georgios Portokalidis, Asia Slowinska, Herbert Bos Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation. Search on Bibsonomy EuroSys The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Yuanding Zhou Least Information Redundancy Algorithm of Printable Shellcode Encoding for X86. Search on Bibsonomy ESORICS Workshops (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Pengju Liu, Baojiang Cui, Can Cui Traffic-Oriented Shellcode Detection Based on VSM. Search on Bibsonomy EIDWT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Guang Yang 0019, Xiang Chen 0005, Yanlin Zhou, Chi Yu DualSC: Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
27Guang Yang 0019, Xiang Chen 0005, Yanlin Zhou, Chi Yu DualSC: Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning. Search on Bibsonomy SANER The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Pietro Liguori, Erfan Al-Hossami, Domenico Cotroneo, Roberto Natella, Bojan Cukic, Samira Shaikh Shellcode_IA32: A Dataset for Automatic Shellcode Generation. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
27Ayan Dey, Shibashis Ghosh, Sukriti Bhattacharya, Nabendu Chaki A robust software watermarking framework using shellcode. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Yue Pan, Jing An, Wenqing Fan, Wei Huang Shellfier: A Shellcode Detection Method based on Dynamic Binary Instrumentation and Convolutional Neural Network. Search on Bibsonomy ICSCA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Shu Akabane, Tomoya Miwa, Takeshi Okamoto An EAF guard driver to prevent shellcode from removing guard pages. Search on Bibsonomy KES The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Tianliang Lu, Lu Zhang 0032, Yixian Fu A Novel Immune-Inspired Shellcode Detection Algorithm Based on Hyperellipsoid Detectors. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Jaewoo Park, Hyoungshick Kim k-Depth Mimicry Attack to Secretly Embed Shellcode into PDF Files. Search on Bibsonomy ICISA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Tiffany Bao, Ruoyu Wang 0001, Yan Shoshitaishvili, David Brumley Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Chong Kuan Chen, Shen-Chieh Lan, Shiuhpyng Winston Shieh Shellcode detector for malicious document hunting. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Damjan Buhov, Richard Thron, Sebastian Schrittwieser Catch Me if You Can! Transparent Detection of Shellcode. Search on Bibsonomy ICSSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Ji-Hyeon Yoon, Jeong Oh Kye, Yongdae Kim, Hae Young Lee Decoder-Free Sino-Korean Shellcode. Search on Bibsonomy ICSSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Takeshi Okamoto SecondDEP: Resilient Computing that Prevents Shellcode Execution in Cyber-Attacks. Search on Bibsonomy KES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Patrick Onotu, David Day, Marcos A. Rodrigues 0001 Accurate shellcode recognition from network traffic data using artificial neural nets. Search on Bibsonomy CCECE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Sven Schindler, Oliver Eggert, Bettina Schnor, Thomas Scheffler Shellcode Detection in IPv6 Networks with HoneydV6. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
27Yonggan Hou, Jianwei Zhuge, Dan Xin, Wenya Feng SBE - A Precise Shellcode Detection Engine Based on Emulation and Support Vector Machine. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
27Erik Bosman, Herbert Bos Framing Signals - A Return to Portable Shellcode. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
27Donghai Tian, Mo Chen, Changzhen Hu, Xuanya Li Efficient Shellcode Detection on Commodity Hardware. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Ang Cui, Jatin Kataria, Salvatore J. Stolfo Revisiting the myth of Cisco IOS diversity: recent advances in reliable shellcode design. Search on Bibsonomy Inf. Manag. Comput. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Ziming Zhao 0001, Gail-Joon Ahn Using instruction sequence abstraction for shellcode detection and attribution. Search on Bibsonomy CNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Pratik Kumar, Nagendra Chowdary, Anish Mathuria Alphanumeric Shellcode Generator for ARM Architecture. Search on Bibsonomy SPACE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Boxuan Gu, Wenbin Zhang 0005, Xiaole Bai, Adam C. Champion, Feng Qin, Dong Xuan JSGuard: Shellcode Detection in JavaScript. Search on Bibsonomy SecureComm The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
27Thomas C. Schmidt, Matthias Wählisch, Benjamin Jochheim, Michael Gröning WiSec 2011 poster: context-adaptive entropy analysis as a lightweight detector of zero-day shellcode on mobiles. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ping Chen 0003, Xiao Xing, Bing Mao, Li Xie 0001, Xiaobin Shen 0001, Xinchun Yin Automatic construction of jump-oriented programming shellcode (on the x86). Search on Bibsonomy AsiaCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Ang Cui, Jatin Kataria, Salvatore J. Stolfo Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design. Search on Bibsonomy WOOT The full citation details ... 2011 DBLP  BibTeX  RDF
27Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems. Search on Bibsonomy Mach. Learn. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Boxuan Gu, Xiaole Bai, Zhimin Yang, Adam C. Champion, Dong Xuan Malicious Shellcode Detection with Virtual Memory Snapshots. Search on Bibsonomy INFOCOM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos Comprehensive shellcode detection using runtime heuristics. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Mehdi Talbi, Mohamed Mejri, Adel Bouhoula Specification and evaluation of polymorphic shellcode properties using a new temporal logic. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Salvatore J. Stolfo Polymorphic shellcode: the demise of signature-based detection. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Daewon Kim, Ikkyun Kim, Jintae Oh, Jongsoo Jang Tracing Stored Program Counter to Detect Polymorphic Shellcode. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Iván Arce The Shellcode Generation. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF taxonomy of attacks, exploitation program, attack, exploits
26Daewon Kim, Yangseo Choi, Ikkyun Kim, Jintae Oh, Jongsoo Jang Function Call Mechanism Based Executable Code Detection for the Network Security. Search on Bibsonomy SAINT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF shellcode, security, network, exploit
20Stéphane Duverger Linux 2.6 kernel exploits. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Hung-Min Sun, Yue-Hsun Lin, Ming-Fung Wu API Monitoring System for Defeating Worms and Exploits in MS-Windows System. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Worm Protection, API Hooking, System Security
20Udo Payer, Peter Teufl, Stefan Kraxberger, Mario Lamberger Massive Data Mining for Polymorphic Code Detection. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #53 of 53 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license