Chrome Extension
WeChat Mini Program
Use on ChatGLM

Research On The Evaluation Of The Effectiveness Of The Algorithm Based On Shellcode Code Analysis And Exploit Module Attack

2016 INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING AND COMMUNICATIONS TECHNOLOGY (IECT 2016)(2016)

Cited 0|Views8
No score
Abstract
The paper first introduces the basic principle of shellcode analysis and exploit attack module, what's more, the paper makes a research on the independence and dependence between shellcode code and exploit attack module. Based on the unique relationship between the two modules, the paper explores the implementation of the two modules, and then proposes a new method based on attack tree theory. Experiments show that attack model performs better and effective. According to different exploits, the proposed transformation of the attack tree evaluation algorithm can give out corresponding threat degree evaluation, and eliminate the generated interference during the middle of executive body attack, so the detection is more accurate.
More
Translated text
Key words
Attack tree module,Shellcode,Exploit,Algorithm effectiveness evaluation
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined