• This paper presents an efficient approach to buffer overflow attacks.

    本文针对缓冲区溢出攻击提出了一种有效的抵御方法

    youdao

  • Buffer overflow attacks have been the most popular methods of attacking network.

    缓冲区溢出攻击已经成为网络攻击主要方式

    youdao

  • Buffer overflow attacks are one of the most notorious software security problems.

    缓冲区溢位攻击恶名昭彰软体安全问题。

    youdao

  • There are two main types of root exploits: buffer overflow attacks and executing scripts against a server.

    这里两种主要超级用户进入类型缓冲溢出攻击服务器上执行脚本

    youdao

  • The number of buffer overflow attacks was increasing during the last two decades, bringing users great loss.

    二十年来,利用缓冲区溢出攻击行为越来越多用户造成巨大的损失

    youdao

  • This makes it much harder to manipulate the return address, but it doesn't defend against buffer overflow attacks that change the data of calling functions.

    这样使得操纵返回地址困难多了不会阻止改变调用函数数据缓冲区溢出攻击

    youdao

  • In this paper, by analyzing the principles of buffer overflow attacks, the array of border checkpoints and other methods to defend buffer overflow attacks.

    该文通过分析缓冲区溢出攻击原理,提出数组边界检查方法来对缓冲区溢出攻击进行防御

    youdao

  • The buffer overflow attacks have been the most common form in the network attacks and become a predominant problem in the system and network security area.

    缓冲区溢出攻击网络攻击事件常用的一种攻击方式,成为系统网络安全中亟待解决重要问题

    youdao

  • In this paper, from programming point of view, the buffer overflow attacks are analyzed and the methods of avoiding buffer overflow at the stage of source code are introduced.

    该文编程角度分析了缓冲区溢出攻击提出源代码阶段尽量避免缓冲区溢出的方法

    youdao

  • And second, they can only detect specific buffer overflow bugs. This paper presents a method combining dynamic binary instrumentation and taint analysis to defense buffer overflow attacks.

    为了解决现有缓冲区溢出防御的两个缺点本文提出综合运用动态二进制探测方法污点分析方法构造缓冲区溢出防御工具的研究内容。

    youdao

  • In this paper, first analyzes the shortcomings of run-time defenses of buffer overflow attacks, and then presents an approach and a tool to statically detect buffer overflow vulnerabilities.

    文中分析了防止缓冲区溢出攻击运行时方法不足介绍一种静态检测缓冲区溢出漏洞的方法工具

    youdao

  • This thesis summarizes the deficiency of contemporary methods for defending the existing buffer overflow attacks and introduces the principle and major technology of buffer overflow attacks.

    本文介绍了缓冲区溢出攻击基本原理关键技术总结了现有缓冲区溢出防御方法不足

    youdao

  • All of these attacksand many othersexploited a vulnerability called a buffer overflow.

    所有这些攻击——以及其他许多攻击,都利用了一个称做缓冲区溢出的程序缺陷。

    youdao

  • The default installation of MySQL, particularly the empty root password and the potential vulnerability to buffer overflow, makes the database server an easy target for attacks.

    MySQL默认安装特别是密码空缺缓冲区溢出潜在漏洞使得这个数据库服务器成为容易攻击目标

    youdao

  • The attack, based on the buffer overflow, is a common means of security attacks and is the only most common security threats at present.

    基于缓冲区溢出攻击一种常见安全攻击手段也是目前惟一最重要最常见的安全威胁

    youdao

  • The vast majority of remote attacks are carried out by exploiting buffer overflow, the particular case of which is stack overflow.

    大多数远程攻击利用缓冲区溢出技术进行特别是溢出。

    youdao

  • The vast majority of remote attacks are carried out by exploiting buffer overflow, the particular case of which is stack overflow.

    大多数远程攻击利用缓冲区溢出技术进行特别是溢出。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定