{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T02:51:52Z","timestamp":1775271112275,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,9]],"date-time":"2009-11-09T00:00:00Z","timestamp":1257724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,9]]},"DOI":"10.1145\/1653662.1653725","type":"proceedings-article","created":{"date-parts":[[2009,11,11]],"date-time":"2009-11-11T13:02:08Z","timestamp":1257944528000},"page":"524-533","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":45,"title":["English shellcode"],"prefix":"10.1145","author":[{"given":"Joshua","family":"Mason","sequence":"first","affiliation":[{"name":"Johns Hopkins University, Baltimore, MD, USA"}]},{"given":"Sam","family":"Small","sequence":"additional","affiliation":[{"name":"Johns Hopkins University, Baltimore, MD, USA"}]},{"given":"Fabian","family":"Monrose","sequence":"additional","affiliation":[{"name":"University of North Carolina, Chapel Hill, NC, USA"}]},{"given":"Greg","family":"MacManus","sequence":"additional","affiliation":[{"name":"iSIGHT Partners, Washington, DC, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25660-1_25"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.11"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455776"},{"key":"e_1_3_2_1_4_1","first-page":"63","volume-title":"Proceedings of the USENIX Security Symposium","author":"Cowan C.","year":"1998","unstructured":"C. Cowan , C. Pu , D. Maier , H. Hinton , P. Bakke , S. Beattie , A. Grier , P. Wagle , and Q. Zhang . Stackguard: Automatic Adaptive Detection and Prevention of Buffer-overflow Attacks . In Proceedings of the USENIX Security Symposium , pages 63 -- 78 , 1998 . C. Cowan, C. Pu, D. Maier, H. Hinton, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. Stackguard: Automatic Adaptive Detection and Prevention of Buffer-overflow Attacks. In Proceedings of the USENIX Security Symposium, pages 63--78, 1998."},{"key":"e_1_3_2_1_5_1","volume-title":"August","author":"Detristan T.","year":"2003","unstructured":"T. Detristan , T. Ulenspiegel , Y. Malcom , and M. S. V. Underduk . Polymorphic Shellcode Engine Using Spectrum Analysis. Phrack, 11(61) , August 2003 . T. Detristan, T. Ulenspiegel, Y. Malcom, and M. S. V. Underduk. Polymorphic Shellcode Engine Using Spectrum Analysis. Phrack, 11(61), August 2003."},{"key":"e_1_3_2_1_6_1","volume-title":"July","author":"Durden T.","year":"2002","unstructured":"T. Durden . Bypassing PaX ASLR Protection. Phrack, 11(59) , July 2002 . T. Durden. Bypassing PaX ASLR Protection. Phrack, 11(59), July 2002."},{"key":"e_1_3_2_1_7_1","unstructured":"K2. ADMmutate. See http:\/\/www.ktwo.ca\/c\/ADMmutate-0.8.4.tar.gz.  K2. ADMmutate. See http:\/\/www.ktwo.ca\/c\/ADMmutate-0.8.4.tar.gz."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2401855.2401899"},{"key":"e_1_3_2_1_10_1","volume-title":"Black Hat USA","author":"MacManus G.","year":"2006","unstructured":"G. MacManus and M. Sutton . Punk Ode: Hiding Shellcode in Plain Sight . In Black Hat USA , 2006 . G. MacManus and M. Sutton. Punk Ode: Hiding Shellcode in Plain Sight. In Black Hat USA, 2006."},{"key":"e_1_3_2_1_11_1","volume-title":"August","year":"2003","unstructured":"Obscou. Building IA32 Unicode-Proof Shellcodes. Phrack, 11(61) , August 2003 . Obscou. Building IA32 Unicode-Proof Shellcodes. Phrack, 11(61), August 2003."},{"key":"e_1_3_2_1_12_1","volume-title":"November","author":"One A.","year":"1996","unstructured":"A. One . Smashing The Stack For Fun And Profit. Phrack, 7(49) , November 1996 . A. One. Smashing The Stack For Fun And Profit. Phrack, 7(49), November 1996."},{"key":"e_1_3_2_1_13_1","first-page":"235","volume-title":"Buttercup: on Network-based Detection of Polymorphic Buffer Overflow Vulnerabilities. In IEEE\/IFIP Network Operation and Management Symposium","author":"Pasupulati A.","year":"2004","unstructured":"A. Pasupulati , J. Coit , K. Levitt , S. F. Wu , S. H. Li , R. C. Kuo , and K. P. Fan . Buttercup: on Network-based Detection of Polymorphic Buffer Overflow Vulnerabilities. In IEEE\/IFIP Network Operation and Management Symposium , pages 235 -- 248 , May 2004 . A. Pasupulati, J. Coit, K. Levitt, S. F. Wu, S. H. Li, R. C. Kuo, and K. P. Fan. Buttercup: on Network-based Detection of Polymorphic Buffer Overflow Vulnerabilities. In IEEE\/IFIP Network Operation and Management Symposium, pages 235--248, May 2004."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11506881_2"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11790754_4"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1776434.1776442"},{"key":"e_1_3_2_1_17_1","volume-title":"An Empirical Study of Real-world Polymorphic Code Injection Attacks. In USENIX Workshop on Large-Scale Exploits and Emergent Threats","author":"Polychronakis M.","year":"2009","unstructured":"M. Polychronakis , K. G. Anagnostakis , and E. P. Markatos . An Empirical Study of Real-world Polymorphic Code Injection Attacks. In USENIX Workshop on Large-Scale Exploits and Emergent Threats , 2009 . M. Polychronakis, K. G. Anagnostakis, and E. P. Markatos. An Empirical Study of Real-world Polymorphic Code Injection Attacks. In USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2009."},{"key":"e_1_3_2_1_18_1","volume-title":"August","year":"2001","unstructured":"Rix. Writing IA32 Alphanumeric Shellcode. Phrack, 11(57) , August 2001 . Rix. Writing IA32 Alphanumeric Shellcode. Phrack, 11(57), August 2001."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315312"},{"key":"e_1_3_2_1_21_1","volume-title":"Black Hat USA","author":"Sotirov A.","year":"2008","unstructured":"A. Sotirov and M. Dowd . Bypassing Browser Memory Protections . In Black Hat USA , 2008 . A. Sotirov and M. Dowd. Bypassing Browser Memory Protections. In Black Hat USA, 2008."},{"key":"e_1_3_2_1_22_1","volume-title":"On the Effectiveness of Instruction Set Randomization. In Proceedings of the USENIX Security Symposium","author":"Sovarel A. N.","year":"2005","unstructured":"A. N. Sovarel , D. Evans , and N. Paul . Where's the FEEB ? On the Effectiveness of Instruction Set Randomization. In Proceedings of the USENIX Security Symposium , 2005 . A. N. Sovarel, D. Evans, and N. Paul. Where's the FEEB? On the Effectiveness of Instruction Set Randomization. In Proceedings of the USENIX Security Symposium, 2005."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754701.1754723"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1054010"},{"key":"e_1_3_2_1_25_1","volume-title":"July","author":"Wana T.","year":"2004","unstructured":"T. Wana . Writing UTF-8 compatible shellcodes. Phrack, 11(62) , July 2004 . T. Wana. Writing UTF-8 compatible shellcodes. Phrack, 11(62), July 2004."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.37"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1229291"}],"event":{"name":"CCS '09: 16th ACM Conference on Computer and Communications Security 2009","location":"Chicago Illinois USA","acronym":"CCS '09","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 16th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1653662.1653725","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1653662.1653725","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:38:53Z","timestamp":1750253933000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1653662.1653725"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,9]]},"references-count":26,"alternative-id":["10.1145\/1653662.1653725","10.1145\/1653662"],"URL":"https:\/\/doi.org\/10.1145\/1653662.1653725","relation":{},"subject":[],"published":{"date-parts":[[2009,11,9]]},"assertion":[{"value":"2009-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}