Uninformed: Informative Information for the Uninformed

Vol 9» 2008.Jan


When utilizing a context-key, the method of encoding is largely unchanged from current methods. The exploit crafter simply passes the encoding function the context-key as its static key value. The size of the context-key is dependent upon the requirements of the encoder being used; however, it is feasible that the key may be of any fixed length, or ideally the same size as the payload being encoded.