This paper presents an efficient approach to buffer overflow attacks.
本文针对缓冲区溢出攻击提出了一种有效的抵御方法。
Buffer overflow attacks have been the most popular methods of attacking network.
缓冲区溢出攻击已经成为网络攻击的主要方式。
Buffer overflow attacks are one of the most notorious software security problems.
缓冲区溢位攻击是一种最恶名昭彰的软体安全问题。
There are two main types of root exploits: buffer overflow attacks and executing scripts against a server.
这里有两种主要的超级用户进入类型:缓冲溢出攻击和在服务器上执行脚本。
The number of buffer overflow attacks was increasing during the last two decades, bringing users great loss.
近二十年来,利用缓冲区溢出的攻击行为越来越多,给用户造成巨大的损失。
This makes it much harder to manipulate the return address, but it doesn't defend against buffer overflow attacks that change the data of calling functions.
这样使得操纵返回地址困难多了,但它不会阻止改变调用函数的数据的缓冲区溢出攻击。
In this paper, by analyzing the principles of buffer overflow attacks, the array of border checkpoints and other methods to defend buffer overflow attacks.
该文通过分析缓冲区溢出攻击的原理,提出数组边界检查等方法来对缓冲区溢出攻击进行防御。
The buffer overflow attacks have been the most common form in the network attacks and become a predominant problem in the system and network security area.
缓冲区溢出攻击是网络攻击事件中最常用的一种攻击方式,成为系统和网络安全中亟待解决的重要问题。
In this paper, from programming point of view, the buffer overflow attacks are analyzed and the methods of avoiding buffer overflow at the stage of source code are introduced.
该文从编程的角度分析了缓冲区溢出攻击,并提出在源代码阶段尽量避免缓冲区溢出的方法。
And second, they can only detect specific buffer overflow bugs. This paper presents a method combining dynamic binary instrumentation and taint analysis to defense buffer overflow attacks.
为了解决现有缓冲区溢出防御的两个缺点,本文提出了综合运用动态二进制探测方法和污点分析方法构造缓冲区溢出防御工具的研究内容。
In this paper, first analyzes the shortcomings of run-time defenses of buffer overflow attacks, and then presents an approach and a tool to statically detect buffer overflow vulnerabilities.
文中分析了防止缓冲区溢出攻击的运行时方法的不足。介绍了一种静态检测缓冲区溢出漏洞的方法及工具。
This thesis summarizes the deficiency of contemporary methods for defending the existing buffer overflow attacks and introduces the principle and major technology of buffer overflow attacks.
本文介绍了缓冲区溢出攻击的基本原理及关键技术,总结了现有的缓冲区溢出防御方法的不足。
All of these attacks — and many others — exploited a vulnerability called a buffer overflow.
所有这些攻击——以及其他许多攻击,都利用了一个称做为缓冲区溢出的程序缺陷。
The default installation of MySQL, particularly the empty root password and the potential vulnerability to buffer overflow, makes the database server an easy target for attacks.
MySQL的默认安装,特别是根密码空缺和缓冲区溢出的潜在漏洞,使得这个数据库服务器成为容易攻击的目标。
The attack, based on the buffer overflow, is a common means of security attacks and is the only most common security threats at present.
基于缓冲区溢出的攻击是一种常见的安全攻击手段,也是目前惟一最重要最常见的安全威胁。
The vast majority of remote attacks are carried out by exploiting buffer overflow, the particular case of which is stack overflow.
大多数远程攻击是利用缓冲区溢出技术进行的,特别是栈溢出。
The vast majority of remote attacks are carried out by exploiting buffer overflow, the particular case of which is stack overflow.
大多数远程攻击是利用缓冲区溢出技术进行的,特别是栈溢出。
应用推荐