1) buffer overflow exploit defending
缓冲区溢出攻击防御
2) defense of buffer overflow
缓冲区溢出防御
1.
The Research and Implementation of Defense of Buffer Overflow Virtual Machine;
缓冲区溢出防御虚拟机的研究与实现
3) buffer overflow attack
缓冲区溢出攻击
1.
Research on Principle and Defense of Buffer Overflow Attacks;
缓冲区溢出攻击原理与防范的研究
2.
Combining with the principles of the produce to buffer overflow attack,this paper analyzes the structure of buffer overflow attack codes,and describes the Snort rules used for buffer overflow attack inspection.
结合缓冲区溢出攻击产生的原理,分析缓冲区溢出攻击代码的结构,论述Snort规则对缓冲区溢出攻击的检测,在此基础上构建一个基于状态图的缓冲区溢出攻击的分析模型。
3.
Undoubtedly, in this networked information era, these bugs make the Buffer Overflow Attack very easy propagate, it threatens the systematic security greatly.
无疑,在这个网络化的信息时代,这些漏洞使得缓冲区溢出攻击极易传播和蔓延,极大地威胁了系统的安全性。
4) buffer overflow attacks
缓冲区溢出攻击
1.
This paper analyzes the principle of the buffer overflow attacks,discusses the modes based on buffer overflow attacks,implantation code and general laws so as to put forward some preventive strategies and measures.
分析了缓冲区溢出攻击的原理,讨论了基于缓冲区溢出的攻击方式和一般规律以及攻击代码的植入方式,给出了防范缓冲区溢出攻击的策略和措施。
2.
In this paper,from programming point of view,the buffer overflow attacks are analyzed and the methods of avoiding buffer overflow at the stage of source code are introduced.
该文从编程的角度分析了缓冲区溢出攻击,并提出在源代码阶段尽量避免缓冲区溢出的方法。
3.
This paper analyses the most commonly used methods on buffer overflow defense and presents a new detecting method of buffer overflow attacks based on address confirmation ,starting by analyzing the principle of buffer overflow attacks.
缓冲区溢出攻击是黑客最常用的有效攻击手段之一,在溢出之后攻击者往往可以直接取得目标主机的最高权限,对计算机安全构成了极大的威胁。
5) buffer overflow
缓冲区溢出攻击
1.
It is a kind of common technique for a hacker to break into remote systems and to get root privileges using buffer overflow on UNIX suid programs.
通过对UNIX的suid程序使用缓冲区溢出攻击已成为黑客入侵远程系统并获取root权限的常用技术。
6) BOFA
缓冲区溢出攻击
1.
Finally we present a software RAP (Return Address Protector) to detect buffer overflow attacks (BOFA) and protect the system from being attacked by BOFAs.
基于缓冲区溢出的攻击是一种常见的安全攻击手段,文中从编程的角度分析了缓冲区溢出攻击(BOFA)、攻击成功的条件及攻击分类,并分析了抵御BOFA的方法。
补充资料:攻击和防御行为
攻击和防御行为 attack and defence behaviour 动物发动的用以伤害或吓退同种或异种个体的行为称为攻击行为。动物为减少自身或其种族被外界不利环境因素以及其他同种或异种个体所伤害而进行的行为称为防御行为。有攻击者就有防御者,所以这两种行为常是成对地在不同个体身上表现出来。有时在一个个体身上这两种行为迅速地交替表现,先前的进攻者会转变为防御者,如狒狒社群中某年轻个体觊觎优势者的地位而向后者发动攻击,但敌不过后者时反受后者攻击。攻击和防御所用手段有些是一样的,有些大不相同。攻击和防御行为可以是动物个体单独进行的,也可以是集体进行的。攻击和防御可见于取食、求偶、育幼等行为中,而集体的攻击和防御行为则属于社群行为。 |
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条