Listing 4. example2.c (vulnerable to a heap-based buffer overflow).
清单4 . example2 . c(容易出现基于堆的缓冲区溢出)。
Listing 1. example1.c (vulnerable to a heap-based buffer overflow).
清单1 . example1 . c(容易出现基于堆的缓冲区溢出)。
The following example is vulnerable to a heap-based buffer overflow
以下示例容易出现基于堆的缓冲区溢出
Listing 1 does not validate user-supplied data when copying it to the buffer member of the previously allocated struct mystruct using the strcpy function, resulting in a heap-based buffer overflow.
在使用strcpy函数将用户提供的数据复制到先前分配的struct mystruct的buffer成员中时,清单1不验证用户提供的数据,造成堆中缓冲区溢出。
Buffer overflow attack technology is a very efficient attack technology based on network.
缓冲区溢出攻击技术是一项十分有效的网络攻击技术。
The attack, based on the buffer overflow, is a common means of security attacks and is the only most common security threats at present.
基于缓冲区溢出的攻击是一种常见的安全攻击手段,也是目前惟一最重要最常见的安全威胁。
This paper presents a buffer overflow detection model based on intermedia assembly which can be used to perform static analysis and detection on executable files.
提出一种基于中间汇编的缓冲区溢出检测模型,用于对可执行代码进行静态分析和检测。
Based on current methods of anti-buffer overflow and the analysis of existing problems, the random fit algorithm was presented.
对已有的溢出防范技术及其存在的问题进行分析,提出了一种基于随机匹配算法的堆溢出防范策略。
Based on current methods of anti-buffer overflow and the analysis of existing problems, the random fit algorithm was presented.
对已有的溢出防范技术及其存在的问题进行分析,提出了一种基于随机匹配算法的堆溢出防范策略。
应用推荐