缓冲区溢出攻击已经成为网络攻击的主要方式。
Buffer overflow attacks have been the most popular methods of attacking network.
本文针对缓冲区溢出攻击提出了一种有效的抵御方法。
This paper presents an efficient approach to buffer overflow attacks.
缓冲区溢出攻击技术是一项十分有效的网络攻击技术。
Buffer overflow attack technology is a very efficient attack technology based on network.
在缓冲区溢出攻击的实例中,程序的内部值溢出,从而改变程序的运行方式。
In the instance of a buffer overflow attack, an internal value in a program is overflowed to alter how the program runs.
并从整个企业实际出发,给出了有效防御缓冲区溢出攻击的策略。
From the reality of the whole enterprise, an effective defensive strategy is presented.
缓冲区溢出攻击是互联网上最普通,也是危害最大的一种网络攻击手段。
Buffer overrun against the Internet is the most common, also harm the largest kind of network attack means.
这样使得操纵返回地址困难多了,但它不会阻止改变调用函数的数据的缓冲区溢出攻击。
This makes it much harder to manipulate the return address, but it doesn't defend against buffer overflow attacks that change the data of calling functions.
许多流行的MIME兼容电子邮件客户端处理某些报头的方法容易受到缓冲区溢出攻击。
Many popular MIME-compliant email clients are susceptible to a buffer overflow in the way they handle certain headers.
最后讨论如何根据溢出规律和植入代码的结构特征,采取有效措施来防御缓冲区溢出攻击。
At last discuss how to defense buffer overflow by the rule of buffer overflow and the structure character of injected code.
该文从编程的角度分析了缓冲区溢出攻击,并提出在源代码阶段尽量避免缓冲区溢出的方法。
In this paper, from programming point of view, the buffer overflow attacks are analyzed and the methods of avoiding buffer overflow at the stage of source code are introduced.
该文通过分析缓冲区溢出攻击的原理,提出数组边界检查等方法来对缓冲区溢出攻击进行防御。
In this paper, by analyzing the principles of buffer overflow attacks, the array of border checkpoints and other methods to defend buffer overflow attacks.
本文介绍了缓冲区溢出攻击的基本原理及关键技术,总结了现有的缓冲区溢出防御方法的不足。
This thesis summarizes the deficiency of contemporary methods for defending the existing buffer overflow attacks and introduces the principle and major technology of buffer overflow attacks.
从根本上讲,所有这些方法都能减轻从程序接管攻击到拒绝服务攻击的缓冲区溢出攻击所带来的破坏。
Fundamentally, all these approaches reduce the damage of a buffer overflow attack from a program-takeover attack into a denial-of-service attack.
实际验证表明,该缓冲区溢出攻击描述语言能够动态地构造植入代码,实现缓冲区溢出攻击的自动化。
The actual verification shows that attack description language can correspondingly construct suitable embedded code and launch attack automatically.
缓冲区溢出攻击是网络攻击事件中最常用的一种攻击方式,成为系统和网络安全中亟待解决的重要问题。
The buffer overflow attacks have been the most common form in the network attacks and become a predominant problem in the system and network security area.
文中分析了防止缓冲区溢出攻击的运行时方法的不足。介绍了一种静态检测缓冲区溢出漏洞的方法及工具。
In this paper, first analyzes the shortcomings of run-time defenses of buffer overflow attacks, and then presents an approach and a tool to statically detect buffer overflow vulnerabilities.
无疑,在这个网络化的信息时代,这些漏洞使得缓冲区溢出攻击极易传播和蔓延,极大地威胁了系统的安全性。
Undoubtedly, in this networked information era, these bugs make the Buffer Overflow Attack very easy propagate, it threatens the systematic security greatly.
恶意软件的一种常见攻击类型,所谓的缓冲区溢出攻击,会使接受输入的程序崩溃,如web浏览器的地址栏或数据库的搜索窗口。
One common type of malware, called a buffer overflow attack, overwhelms programs that accept input, like the address line in a Web browser or a search window for a database.
基本上,如果攻击者能够溢出缓冲区的边界,麻烦或许就会找上你了。
Basically, if an attacker can overflow the bounds of a buffer, you're probably in trouble.
攻击者也许能够通过改变函数中其他数据的值来利用缓冲区溢出;没有哪种方法能够防止这点。
An attacker may be able to exploit a buffer overflow by changing the value of other data in the function; none of these approaches counter that.
内存空间缺口——通过栈溢出、缓冲区溢出或堆错误来实现,以宿主进程的权限执行攻击者提供的任何代码。
Memory space breach — Accomplished via stack overflow, buffer overrun, or heap error, enables execution of arbitrary code supplied by the attacker with the permissions of the host process.
这种攻击可能还会导致缓冲区溢出。
所有这些攻击——以及其他许多攻击,都利用了一个称做为缓冲区溢出的程序缺陷。
All of these attacks — and many others — exploited a vulnerability called a buffer overflow.
MySQL的默认安装,特别是根密码空缺和缓冲区溢出的潜在漏洞,使得这个数据库服务器成为容易攻击的目标。
The default installation of MySQL, particularly the empty root password and the potential vulnerability to buffer overflow, makes the database server an easy target for attacks.
这是一种有用的方法,不过要注意这种方法无法防止缓冲区溢出改写其他值(攻击者仍然能够利用这些值来攻击系统)。
This is a useful approach, but note that this does not protect against buffer overflows overwriting other values (which they may still be able to use to attack a system).
利用缓冲区溢出进行攻击可以改变这个过程,并且允许黑客执行任何他们期望的函数。
Attacking using a buffer overflow can change this process and allow an attacker to execute any function they wish.
任何允许外部实体来输入数据的程序都容易受到恶意的攻击,例如缓冲区溢出和嵌入式控制字符。
Any program that allows an external entity to input data is vulnerable to malicious activity, such as buffer overflows and embedded control characters.
如果攻击者能够导致缓冲区溢出,那么它就能控制程序中的其他值。
If an attacker can cause a buffer to overflow, then the attacker can control other values in the program.
通常攻击者会使用它想要运行的恶意代码来使缓冲区溢出,然后攻击者会更改返回值以指向它们已发送的恶意代码。
Often the attacker will overrun the buffer with the malicious code the attacker wants to run, and the attacker will then change the return value to point to the malicious code they've sent.
通常攻击者会使用它想要运行的恶意代码来使缓冲区溢出,然后攻击者会更改返回值以指向它们已发送的恶意代码。
Often the attacker will overrun the buffer with the malicious code the attacker wants to run, and the attacker will then change the return value to point to the malicious code they've sent.
应用推荐