100字范文,内容丰富有趣,生活中的好帮手!
100字范文 > 缓冲区溢出 buffer overflow英语短句 例句大全

缓冲区溢出 buffer overflow英语短句 例句大全

时间:2020-11-01 05:17:21

相关推荐

缓冲区溢出 buffer overflow英语短句 例句大全

缓冲区溢出,buffer overflow

1)buffer overflow缓冲区溢出

1.Method for precisely detectingbuffer overflow vulnerabilities in C programs;C程序缓冲区溢出漏洞精确检测方法

2.A Buffer Overflow Detection Based on Inequalities Solution;一种基于不等式组求解的缓冲区溢出检测

3.Defense of Linuxbuffer overflow;Linux缓冲区溢出攻击的防范

英文短句/例句

1.Method of integer overflow detection to avoid buffer overflow一种防止缓冲区溢出的整数溢出检测方法(英文)

2.BURN-Proof Buffer UnderRuN-Proof防止缓冲区溢出,三洋的刻录保护技术

3.Research on Technologies of Attacks and Detections of Buffer Overflow Vulnerabilities;缓冲区溢出漏洞攻击和检测技术研究

4.The Research and Implementation of Defense of Buffer Overflow Virtual Machine;缓冲区溢出防御虚拟机的研究与实现

5.Buffer Overflow and SQL Injection for Penetration Test;缓冲区溢出和SQL注入的渗透测试

6.Windows Buffer Overflow Exploit Code Analysis;Windows缓冲区溢出Exploit代码分析研究

7.The Buffer Overflow in C Program Design;C语言程序设计中的缓冲区溢出问题

8.Research on Buffer Overflow Attack and Defense缓冲区溢出攻击分析及防范策略研究

9.Web Browser-Based Buffer Overflow Attack DetectionWeb浏览器缓冲区溢出攻击检测技术

10.The Research of RPC Overflow Vulnerability基于Windows平台的RPC缓冲区溢出漏洞研究

11.Buffer Overflow Detection Model Based on Intermedia Assembly基于中间汇编的缓冲区溢出检测模型

12.The total number of Buffer Overrun Errors for this connection. Buffer Overrun Errors when the software cannot handle the rate at which data is received.这次连接的缓冲区溢出错误总数。当软件无法无法处理接收数据的速率时出现缓冲区溢出错误。

13.Dynamic Detection of Buffer-overflow Vulnerability in Binary Environment;二进制环境下的缓冲区溢出漏洞动态挖掘

14.Detecting Buffer Overflow in Binary Code by Analyzing Unsafe Functions;基于不安全函数的缓冲区溢出发现技术研究

15.Research of Attack Technique and Defense Policy Based on Buffer Overflow;基于缓冲区溢出的攻击技术及防御策略研究

16.The Research of Buffer Overflow Finding Base on Characterization;基于特征分析的缓冲区溢出发现技术研究

17.Study on Pointer Analysis Technology in Static Buffer Overflow Analysis;缓冲区溢出静态分析中的指针分析技术研究

18.Working Theory of Aggression Based on Buffer Overflow and Defence Scheme;缓冲区溢出攻击的工作原理及防范策略

相关短句/例句

buffer overrun缓冲区溢出

1.The theory of stack basedbuffer overruns;基于堆栈的缓冲区溢出攻击原理

2.This paper analysed the principle of worm virus andbuffer overrun,and presented an experimental scheme of worm virus exploitingbuffer overrun that aims at the difficulties of experimental teaching of computer virus to students of information security specialty at present.分析了蠕虫病毒和缓冲区溢出的基本原理,针对目前在信息安全专业中开展计算机病毒实践教学的难点,给出了一个缓冲区溢出蠕虫病毒的实验设计方案。

3.This paper proposes a flow-sensitive algorithm to detectbuffer overruns statically.通过需求驱动的控制流分析和数据流分析,建立内存访问语句和函数调用语句发生溢出的线性约束,从而将缓冲区溢出的检测问题转换为线性约束求解问题。

3)remote buffer overflow远程缓冲区溢出

1.After the analysis of the principles and methods of buffer overflow,we presented a new approach that is Code Execution Simulation(CES) to detect networkremote buffer overflow.实验证明,该检测方法不仅能快速有效地检测传统的远程缓冲区溢出的攻击,而且还可以检测变形的shellcode。

4)buffer overflow attack缓冲区溢出攻击

1.Research on Principle and Defense of Buffer Overflow Attacks;缓冲区溢出攻击原理与防范的研究

bining with the principles of the produce tobuffer overflow attack,this paper analyzes the structure ofbuffer overflow attack codes,and describes the Snort rules used forbuffer overflow attack inspection.结合缓冲区溢出攻击产生的原理,分析缓冲区溢出攻击代码的结构,论述Snort规则对缓冲区溢出攻击的检测,在此基础上构建一个基于状态图的缓冲区溢出攻击的分析模型。

3.Undoubtedly, in this networked information era, these bugs make the Buffer Overflow Attack very easy propagate, it threatens the systematic security greatly.无疑,在这个网络化的信息时代,这些漏洞使得缓冲区溢出攻击极易传播和蔓延,极大地威胁了系统的安全性。

5)buffer overflow detection缓冲区溢出检测

1.According to the theory of buffer overflow,abuffer overflow detection model based on executable code is proposed.根据缓冲区溢出原理,提出一种基于可执行代码的缓冲区溢出检测模型,给出该模型的理论基础,描述模型构建的过程,提出新的缓冲区引用实例的识别方法。

6)buffer overflow attacks缓冲区溢出攻击

1.This paper analyzes the principle of thebuffer overflow attacks,discusses the modes based onbuffer overflow attacks,implantation code and general laws so as to put forward some preventive strategies and measures.分析了缓冲区溢出攻击的原理,讨论了基于缓冲区溢出的攻击方式和一般规律以及攻击代码的植入方式,给出了防范缓冲区溢出攻击的策略和措施。

2.In this paper,from programming point of view,thebuffer overflow attacks are analyzed and the methods of avoiding buffer overflow at the stage of source code are introduced.该文从编程的角度分析了缓冲区溢出攻击,并提出在源代码阶段尽量避免缓冲区溢出的方法。

3.This paper analyses the most commonly used methods on buffer overflow defense and presents a new detecting method ofbuffer overflow attacks based on address confirmation ,starting by analyzing the principle ofbuffer overflow attacks.缓冲区溢出攻击是黑客最常用的有效攻击手段之一,在溢出之后攻击者往往可以直接取得目标主机的最高权限,对计算机安全构成了极大的威胁。

延伸阅读

高光溢出高光溢出(blooming)数码相机传感器上的象素负责收集光子,并通过光电二极管把光子转化成电荷,继而通过一系列处理,形成图像。一旦接收光子的“桶”(bucket)满载,由额外光子转化成的电荷便会溢出,并且这种溢出对象素值是没有影响的,因此会导致象素值的感光不足或感光过度。当电荷溢出至其旁边的象素,使旁边的象素在处理光子过程中感光过度(例如描述天空的明亮的象素有电荷溢出,使树叶或树枝边缘的较暗的象素感光过度),这时候就是“高光溢出”。高光溢出不仅会使画面损失细节,而且增加了紫边出现的机会。一些传感器带有“高光溢出保护”(anti-blooming gates)功能,吸收溢出的电荷,减少溢出电荷对附近象素的滋扰。这种功能基本能抑止高光溢出,除非照片光暗对比非常强烈或由于人为原因造成照片严重过曝。

本内容不代表本网观点和政治立场,如有侵犯你的权益请联系我们处理。
网友评论
网友评论仅供其表达个人看法,并不表明网站立场。