This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
The Shellcode Generation
September-October 2004 (vol. 2 no. 5)
pp. 72-76
Iv? Arce, Core Security Technologies
Attackers carry out many network security compromises using exploitation programs, or exploits, which take advantage of bugs in software running on vulnerable systems. These programs are often the only remaining evidence of a security compromise; by analyzing them, we can assess the incident's impact and the attackers' skills and intent. We can build an entire taxonomy of attacks by understanding these programs' technical capabilities and their connection to those who develop and use them.
Index Terms:
attack, taxonomy of attacks, exploitation program, exploits
Citation:
Iv? Arce, "The Shellcode Generation," IEEE Security & Privacy, vol. 2, no. 5, pp. 72-76, Sept.-Oct. 2004, doi:10.1109/MSP.2004.87
Usage of this product signifies your acceptance of the Terms of Use.