DocumentCode :
1127962
Title :
The shellcode generation
Author :
Arce, Irwin
Author_Institution :
Core Security Technol., Boston, MA, USA
Volume :
2
Issue :
5
fYear :
2004
Firstpage :
72
Lastpage :
76
Abstract :
We can build an entire taxonomy of attacks on network security by understanding exploitation programs, which take advantage of bugs in software running on vulnerable systems, these programs´ technical capabilities and their connection to those who develop and use them. For the past decade, exploit tools have signaled the evolution of a community of adversaries comprising numerous inexperienced and unskilled attackers commonly referred to as script kiddies, and a few experienced, technically savvy attackers. Exploit programs are tell-tale signs of attackers´ sophistication: if studied meticulously, they can provide insight into current and future trends.
Keywords :
computer network management; invasive software; telecommunication security; attack taxonomy; exploit tools; exploitation programs; future trends; network security; script kiddies; shellcode; Computer bugs; Computer security; Computer worms; Extremities; Information security; Payloads; Privacy; Software packages; Springs; Weapons; attack; exploitation program; exploits; taxonomy of attacks;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSP.2004.87
Filename :
1341416
Link To Document :
بازگشت