An Exploit Traffic Detection Method Based on Reverse Shell

Y Liu, R Cai, X Yin, S Liu - Applied Sciences, 2023 - mdpi.com
As the most crucial link in the network kill chain, exploiting a vulnerability is viewed as one of
the most popular attack vectors to get the control authority of the system, which is dangerous …

An Analysis Tool that Detects The Code Caves in Specified Sizes for Portable Executable Files

G Uğurlu, K Açıcı - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Code caves represent sequential null bytes in portable executable files and are particularly
used in reverse engineering. With the help of code caves, the execution flow of the program …

[PDF][PDF] ANovel EXPLOIT TRAFFIC TRACEBACK METHOD BASED ON SESSION RELATIONSHIP

Y Liu, R Cai, X Yin, S Liu - CS & IT Conference Proceedings, 2023 - csitcp.net
Vulnerability exploitation is the key to obtaining the control authority of the system, posing a
significant threat to network security. Therefore, it is necessary to discover exploitation from …

[PDF][PDF] Security Issues and Challenges in Windows OS Level

ULM Rijah, UUS Rajapaksha - 2022 - seu.ac.lk
An operating system is a software that controls and communicates with the computer's
hardware and offers the most fundamental services to other applications. The operating …