Data streams are scanned to detect malicious jump-call-pop shellcode
constructs used in attacks against stack-based buffer overflow
vulnerabilities on software executing in the IA32 architecture prior to
execution. Upon a detection of a malicious jump-call-pop shellcode
construct, protective action is taken, such as preventing the malicious
shellcode from executing.