说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 词典 -> 缓冲区溢出脆弱性
1)  Buffer overflow vulnerability
缓冲区溢出脆弱性
2)  buffer overflow
缓冲区溢出
1.
Method for precisely detecting buffer overflow vulnerabilities in C programs;
C程序缓冲区溢出漏洞精确检测方法
2.
A Buffer Overflow Detection Based on Inequalities Solution;
一种基于不等式组求解的缓冲区溢出检测
3.
Defense of Linux buffer overflow;
Linux缓冲区溢出攻击的防范
3)  buffer overrun
缓冲区溢出
1.
The theory of stack based buffer overruns;
基于堆栈的缓冲区溢出攻击原理
2.
This paper analysed the principle of worm virus and buffer overrun,and presented an experimental scheme of worm virus exploiting buffer overrun that aims at the difficulties of experimental teaching of computer virus to students of information security specialty at present.
分析了蠕虫病毒和缓冲区溢出的基本原理,针对目前在信息安全专业中开展计算机病毒实践教学的难点,给出了一个缓冲区溢出蠕虫病毒的实验设计方案。
3.
This paper proposes a flow-sensitive algorithm to detect buffer overruns statically.
通过需求驱动的控制流分析和数据流分析,建立内存访问语句和函数调用语句发生溢出的线性约束,从而将缓冲区溢出的检测问题转换为线性约束求解问题。
4)  remote buffer overflow
远程缓冲区溢出
1.
After the analysis of the principles and methods of buffer overflow,we presented a new approach that is Code Execution Simulation(CES) to detect network remote buffer overflow.
实验证明,该检测方法不仅能快速有效地检测传统的远程缓冲区溢出的攻击,而且还可以检测变形的shellcode。
5)  buffer overflow attack
缓冲区溢出攻击
1.
Research on Principle and Defense of Buffer Overflow Attacks;
缓冲区溢出攻击原理与防范的研究
2.
Combining with the principles of the produce to buffer overflow attack,this paper analyzes the structure of buffer overflow attack codes,and describes the Snort rules used for buffer overflow attack inspection.
结合缓冲区溢出攻击产生的原理,分析缓冲区溢出攻击代码的结构,论述Snort规则对缓冲区溢出攻击的检测,在此基础上构建一个基于状态图的缓冲区溢出攻击的分析模型。
3.
Undoubtedly, in this networked information era, these bugs make the Buffer Overflow Attack very easy propagate, it threatens the systematic security greatly.
无疑,在这个网络化的信息时代,这些漏洞使得缓冲区溢出攻击极易传播和蔓延,极大地威胁了系统的安全性。
6)  buffer overflow detection
缓冲区溢出检测
1.
According to the theory of buffer overflow,a buffer overflow detection model based on executable code is proposed.
根据缓冲区溢出原理,提出一种基于可执行代码的缓冲区溢出检测模型,给出该模型的理论基础,描述模型构建的过程,提出新的缓冲区引用实例的识别方法。
补充资料:脆弱性骨硬化


脆弱性骨硬化
osteopoikilosis

1915年Albers-Schonberg首先描述。起因不明。多见于男性,患者父母多有亲属关系。长骨内有致密斑点,但骨皮质正常,骨形态无改变,一般无症状。常伴有皮肤病变,如硬皮病、弥散性豆状皮肤纤维瘤病。无特效疗法。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条