Buffer Overflow Attacks的意思|示意
缓冲区溢出攻击
Buffer Overflow Attacks的网络常见释义
缓冲区溢出攻击 ... Exploit代码附录A 完整的数据换算表附录B 有用的系统调用函数 《缓冲区溢出攻击-检测、剖析与预防》( Buffer Overflow Attacks: Detect, Exploit, Prevent )扫描版[PDF] eD2k链接...
Buffer Overflow Attacks相关例句
The attack, based on the buffer overflow, is a common means of security attacks and is the only most common security threats at present.
基于缓冲区溢出的攻击是一种常见的安全攻击手段,也是目前惟一最重要最常见的安全威胁。
The buffer overflow attacks have been the most common form in the network attacks and become a predominant problem in the system and network security area.
缓冲区溢出攻击是网络攻击事件中最常用的一种攻击方式,成为系统和网络安全中亟待解决的重要问题。
In this paper, by analyzing the principles of buffer overflow attacks, the array of border checkpoints and other methods to defend buffer overflow attacks.
该文通过分析缓冲区溢出攻击的原理,提出数组边界检查等方法来对缓冲区溢出攻击进行防御。
There are two main types of root exploits: buffer overflow attacks and executing scripts against a server.
这里有两种主要的超级用户进入类型:缓冲溢出攻击和在服务器上执行脚本。
And second, they can only detect specific buffer overflow bugs. This paper presents a method combining dynamic binary instrumentation and taint analysis to defense buffer overflow attacks.
为了解决现有缓冲区溢出防御的两个缺点,本文提出了综合运用动态二进制探测方法和污点分析方法构造缓冲区溢出防御工具的研究内容。
The vast majority of remote attacks are carried out by exploiting buffer overflow, the particular case of which is stack overflow.
大多数远程攻击是利用缓冲区溢出技术进行的,特别是栈溢出。