说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 词典 -> 缓冲区溢出
1)  buffer overflow
缓冲区溢出
1.
Method for precisely detecting buffer overflow vulnerabilities in C programs;
C程序缓冲区溢出漏洞精确检测方法
2.
A Buffer Overflow Detection Based on Inequalities Solution;
一种基于不等式组求解的缓冲区溢出检测
3.
Defense of Linux buffer overflow;
Linux缓冲区溢出攻击的防范
2)  buffer overrun
缓冲区溢出
1.
The theory of stack based buffer overruns;
基于堆栈的缓冲区溢出攻击原理
2.
This paper analysed the principle of worm virus and buffer overrun,and presented an experimental scheme of worm virus exploiting buffer overrun that aims at the difficulties of experimental teaching of computer virus to students of information security specialty at present.
分析了蠕虫病毒和缓冲区溢出的基本原理,针对目前在信息安全专业中开展计算机病毒实践教学的难点,给出了一个缓冲区溢出蠕虫病毒的实验设计方案。
3.
This paper proposes a flow-sensitive algorithm to detect buffer overruns statically.
通过需求驱动的控制流分析和数据流分析,建立内存访问语句和函数调用语句发生溢出的线性约束,从而将缓冲区溢出的检测问题转换为线性约束求解问题。
3)  remote buffer overflow
远程缓冲区溢出
1.
After the analysis of the principles and methods of buffer overflow,we presented a new approach that is Code Execution Simulation(CES) to detect network remote buffer overflow.
实验证明,该检测方法不仅能快速有效地检测传统的远程缓冲区溢出的攻击,而且还可以检测变形的shellcode。
4)  buffer overflow attack
缓冲区溢出攻击
1.
Research on Principle and Defense of Buffer Overflow Attacks;
缓冲区溢出攻击原理与防范的研究
2.
Combining with the principles of the produce to buffer overflow attack,this paper analyzes the structure of buffer overflow attack codes,and describes the Snort rules used for buffer overflow attack inspection.
结合缓冲区溢出攻击产生的原理,分析缓冲区溢出攻击代码的结构,论述Snort规则对缓冲区溢出攻击的检测,在此基础上构建一个基于状态图的缓冲区溢出攻击的分析模型。
3.
Undoubtedly, in this networked information era, these bugs make the Buffer Overflow Attack very easy propagate, it threatens the systematic security greatly.
无疑,在这个网络化的信息时代,这些漏洞使得缓冲区溢出攻击极易传播和蔓延,极大地威胁了系统的安全性。
5)  buffer overflow detection
缓冲区溢出检测
1.
According to the theory of buffer overflow,a buffer overflow detection model based on executable code is proposed.
根据缓冲区溢出原理,提出一种基于可执行代码的缓冲区溢出检测模型,给出该模型的理论基础,描述模型构建的过程,提出新的缓冲区引用实例的识别方法。
6)  buffer overflow attacks
缓冲区溢出攻击
1.
This paper analyzes the principle of the buffer overflow attacks,discusses the modes based on buffer overflow attacks,implantation code and general laws so as to put forward some preventive strategies and measures.
分析了缓冲区溢出攻击的原理,讨论了基于缓冲区溢出的攻击方式和一般规律以及攻击代码的植入方式,给出了防范缓冲区溢出攻击的策略和措施。
2.
In this paper,from programming point of view,the buffer overflow attacks are analyzed and the methods of avoiding buffer overflow at the stage of source code are introduced.
该文从编程的角度分析了缓冲区溢出攻击,并提出在源代码阶段尽量避免缓冲区溢出的方法。
3.
This paper analyses the most commonly used methods on buffer overflow defense and presents a new detecting method of buffer overflow attacks based on address confirmation ,starting by analyzing the principle of buffer overflow attacks.
缓冲区溢出攻击是黑客最常用的有效攻击手段之一,在溢出之后攻击者往往可以直接取得目标主机的最高权限,对计算机安全构成了极大的威胁。
补充资料:高光溢出

高光溢出(blooming)

数码相机传感器上的象素负责收集光子,并通过光电二极管把光子转化成电荷,继而通过一系列处理,形成图像。一旦接收光子的“桶”(bucket)满载,由额外光子转化成的电荷便会溢出,并且这种溢出对象素值是没有影响的,因此会导致象素值的感光不足或感光过度。当电荷溢出至其旁边的象素,使旁边的象素在处理光子过程中感光过度(例如描述天空的明亮的象素有电荷溢出,使树叶或树枝边缘的较暗的象素感光过度),这时候就是“高光溢出”。高光溢出不仅会使画面损失细节,而且增加了紫边出现的机会。

一些传感器带有“高光溢出保护”(anti-blooming gates)功能,吸收溢出的电荷,减少溢出电荷对附近象素的滋扰。这种功能基本能抑止高光溢出,除非照片光暗对比非常强烈或由于人为原因造成照片严重过曝。

说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条