1) stack smashing
栈溢出攻击
1.
This technique,which consists of instrumenting a given executable with a mechanism to detect stack smashing attacks,works at install-time and does not rely on having access to the source-code.
针对栈溢出攻击依然是流行的计算机系统攻击手段的状况,文章为Windows开发了一个工作在装配时刻的防御栈溢出攻击的新方法,它运用栈溢出攻击检测机制来改写给定的可执行文件,不需要源代码支持。
2.
Stack smashing is still one of the most popular techniques for computer system attack.
当前栈溢出攻击依然是最流行的计算机系统攻击手段之一。
2) overflow attack
溢出攻击
1.
Hardware-based Technology to Prevent Buffer Overflow Attacks on Windows System——DEP;
Windows中基于硬件的缓冲区溢出攻击防范技术——DEP
2.
Overflow attack does the broadest harm to network applications.
溢出攻击是网络上威胁最大的一种攻击方式,现有的防护技术存在不同的缺陷。
3) heap overflow attack
堆溢出攻击
4) bss overflow attack
Bss溢出攻击
5) buffer overflow attack
缓冲区溢出攻击
1.
Research on Principle and Defense of Buffer Overflow Attacks;
缓冲区溢出攻击原理与防范的研究
2.
Combining with the principles of the produce to buffer overflow attack,this paper analyzes the structure of buffer overflow attack codes,and describes the Snort rules used for buffer overflow attack inspection.
结合缓冲区溢出攻击产生的原理,分析缓冲区溢出攻击代码的结构,论述Snort规则对缓冲区溢出攻击的检测,在此基础上构建一个基于状态图的缓冲区溢出攻击的分析模型。
3.
Undoubtedly, in this networked information era, these bugs make the Buffer Overflow Attack very easy propagate, it threatens the systematic security greatly.
无疑,在这个网络化的信息时代,这些漏洞使得缓冲区溢出攻击极易传播和蔓延,极大地威胁了系统的安全性。
6) buffer overflow attacks
缓冲区溢出攻击
1.
This paper analyzes the principle of the buffer overflow attacks,discusses the modes based on buffer overflow attacks,implantation code and general laws so as to put forward some preventive strategies and measures.
分析了缓冲区溢出攻击的原理,讨论了基于缓冲区溢出的攻击方式和一般规律以及攻击代码的植入方式,给出了防范缓冲区溢出攻击的策略和措施。
2.
In this paper,from programming point of view,the buffer overflow attacks are analyzed and the methods of avoiding buffer overflow at the stage of source code are introduced.
该文从编程的角度分析了缓冲区溢出攻击,并提出在源代码阶段尽量避免缓冲区溢出的方法。
3.
This paper analyses the most commonly used methods on buffer overflow defense and presents a new detecting method of buffer overflow attacks based on address confirmation ,starting by analyzing the principle of buffer overflow attacks.
缓冲区溢出攻击是黑客最常用的有效攻击手段之一,在溢出之后攻击者往往可以直接取得目标主机的最高权限,对计算机安全构成了极大的威胁。
补充资料:栈栈
1.众盛貌。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条