The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.05 - September-October (2004 vol.2)
pp: 72-76
Iv? Arce , Core Security Technologies
ABSTRACT
Attackers carry out many network security compromises using exploitation programs, or exploits, which take advantage of bugs in software running on vulnerable systems. These programs are often the only remaining evidence of a security compromise; by analyzing them, we can assess the incident's impact and the attackers' skills and intent. We can build an entire taxonomy of attacks by understanding these programs' technical capabilities and their connection to those who develop and use them.
INDEX TERMS
attack, taxonomy of attacks, exploitation program, exploits
CITATION
Iv? Arce, "The Shellcode Generation", IEEE Security & Privacy, vol.2, no. 5, pp. 72-76, September-October 2004, doi:10.1109/MSP.2004.87
15 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool