缓冲区溢出攻击

  • 网络buffer overflow attack
缓冲区溢出攻击缓冲区溢出攻击
  1. Web浏览器缓冲区溢出攻击检测技术

    Web Browser-Based Buffer Overflow Attack Detection

  2. 缓冲区溢出攻击的分析和一种防卫算法RAP

    Analysis of Buffer Overflow Attack and a Defending Algorithm RAP

  3. Linux缓冲区溢出攻击检测与防范技术

    Techniques on Prevention and Detection of Buffer Overflow Attacks on Linux

  4. 基于CPU硬件的缓冲区溢出攻击的防范技术

    Technology to Prevent Buffer Overflow Attacks Based on CPU Hardware

  5. 对设计进行功能仿真和FPGA验证,监控单元可以有效地防御缓冲区溢出攻击。

    From the simulation and FPGA verification , monitoring unit can effectively defense buffer overflow attacks .

  6. UNIX缓冲区溢出攻击:技术原理、防范与检测

    Buffer Overflow attacks on UNIX : Technical Principles , Prevention and Detection

  7. 针对这一问题,论文以缓冲区溢出攻击与防御研究为主题,以windows系统为平台,力图系统地对缓冲区溢出多方面的性质进行综合研究。

    Therefore this paper author attempts to conduct a comprehensive research on attack and defense of buffer overflow under windows platform .

  8. 在FPGA板上的实验结果表明该监控模块能够有效防住大部分缓冲区溢出攻击,监控模块带来了5%的硬件开销和0.1%的性能损耗。

    The experiment results on FPGA board shows that our memory monitor module can effectively defend majority buffer overflow attacks .

  9. 为防范缓冲区溢出攻击,在Intel32位CPU及Windows系统下实现了不可执行堆栈。

    A non-executable stack approach is proposed and evaluated to defense against stack-based buffer overflow attacks under Windows and Intel 32-bit CPUs .

  10. 对基于WEB的主要攻击手段进行了分析,实现了对违反访问规则、缓冲区溢出攻击、模式匹配、重复失败访问的检测。

    Analyze the main approachs that attack the web server . Implement the IDS that can detect the activity that violate the access control regulation , buffer overflow , and repeated access failure .

  11. 许多流行的MIME兼容电子邮件客户端处理某些报头的方法容易受到缓冲区溢出攻击。

    Many popular MIME-compliant email clients are susceptible to a buffer overflow in the way they handle certain headers .

  12. 通过对UNIX的suid程序使用缓冲区溢出攻击已成为黑客入侵远程系统并获取root权限的常用技术。

    It is a kind of common technique for a hacker to break into remote systems and to get root privileges using buffer overflow on UNIX suid programs .

  13. 在此基础上,通过对一个Windows网络缓冲区溢出攻击实例的详细调试分析,研究了Windows缓冲区溢出攻击的整个过程,剖析了攻击者是如何利用缓冲区溢出漏洞进行攻击的。

    On this base , via the detailed debugging of a network buffer overflow attack example , the paper also researches the course of buffer overflow attack and how attackers attack Windows system by the use of buffer overflow leaks .

  14. nntp筛选器事件,如新闻组访问权限策略冲突、拒绝的命令和缓冲区溢出攻击等等。

    An NNTP filter event , such as newsgroup access rights policy violation , rejected commands , buffer overflow attacks , etc.

  15. 缓冲区溢出攻击往往利用服务程序或者是suid程序的漏洞,改变程序的服务流程,进而控制系统。

    Buffer overflow attacks usually subvert the vulnerabilities of a privileged program so that the attacker can take control of the program , thence control the system .

  16. 一种基于程序逻辑结构分析的缓冲区溢出攻击抵御方法

    An Approach to Buffer Overflow Attacks Based on Program Logic Analysis

  17. 缓冲区溢出攻击是最普遍和对系统具有致命威胁的一种攻击手段。

    Buffer overflow is the most common form of security vulnerability .

  18. 面向网络对抗的缓冲区溢出攻击描述语言研究

    Study on buffer overflow attack description language of computer network counterwork

  19. 基于切片技术的远程缓冲区溢出攻击检测模型

    A Model of Defense Remote Buffer Overflow Attack Based On Slice Technology

  20. 基于进程执行轮廓的缓冲区溢出攻击效果检测

    Buffer Overflow Attack Impact Detection Based on Process Execution Profile

  21. 缓冲区溢出攻击和防御措施

    A Study of Theories and Protections on Buffer Overflow Attacks

  22. 缓冲区溢出攻击:原理,防御及检测

    Buffer Overflow Attack : Theory , Recovery and Detection

  23. 缓冲区溢出攻击已经成为网络攻击的主要方式。

    Buffer overflow attacks have been the most popular methods of attacking network .

  24. 远程缓冲区溢出攻击的原理分析与检测

    The Principle and Detection of Remote Buffer Overflow Attack

  25. 缓冲区溢出攻击及防御措施的研究

    Study on Buffer Overflow Attack and New Protection Method

  26. 缓冲区溢出攻击与防止技术

    The technique on attack and prevention of buffer overflow

  27. 缓冲区溢出攻击中关键技术的代码实现对缓冲区溢出攻击中关键部分Shellcode高级代码进行了编写。

    Realization of buffer overflow attack key technique .

  28. 缓冲区溢出攻击技术是一项十分有效的网络攻击技术。

    Buffer overflow attack technology is a very efficient attack technology based on network .

  29. 防御缓冲区溢出攻击的有效策略

    Effective Strategy in Defence of Buffer Overflow Attacks

  30. 缓冲区溢出攻击及对策

    Buffer Overflow Attacks and Way of Countermeasures