在第三章中,我们首先详细介绍了水印去除攻击、密钥攻击及协议攻击。
In the third chapter, we first detail some watermarking attacks including watermark removal attacks, cryptographic attacks and protocol attacks.
实验结果表明,该方法能够有效地去除攻击图中冗余的边和节点,从而降低了攻击图的规模。
Experiment results show that the proposed method can efficiently remove the redundant edges and nods in the attack graphs, consequently decreases the scale of the attack graphs.
最有趣的BUG事实上现在在游戏里还存在,因为实在是太逗了所以没有去除:如果你走近一个友好的NPC并攻击他们,他们会变得焦虑不安并还手。
The funniest bug is actually still present in the game because it was just too awesome to remove: if you approach a friendly NPC and attack them, they become agitated and will attack you back.
可编辑数据验证——为了去除跨站点脚本和SQL注入攻击,HDIV分析所有的可编辑数据域。
Editable Data Validation - HDIV analyzes all editable fields to remove cross-site scripting and SQL injection attacks.
这种来自微软研究的新策略完全去除了复杂密码的要求,同时也保护了词典攻击和统计学猜测。
The new scheme from Microsoft Research does away with complexity requirements entirely while protecting against both dictionary attacks and statistical guessing.
这不如永久地去除特权好,因为如果攻击者可以控制您的程序,攻击者就可以重新启用特权并利用它。
This isn't as good as permanently dropping the privilege, since if an attacker can take control of your program, the attacker can re-enable the privilege and exploit it.
USBQC将帮助你去除危险的应用程序之前,它通过USB存储设备攻击你的电脑。
USBQC will help you to remove dangerous applications before it attack your PC via USB memory devices.
虽然乍一看,最优化去除变形变换结果看似一项有前途的技术,但是这种分析技术真正成功与否是要看它们会遭遇什么样的攻击。
Though, at first glance, optimizing away the effects of metamorphic transformations looks like a promising technique, the real test of such analysis techniques depends on how they can be attacked.
虽然乍一看,最优化去除变形变换结果看似一项有前途的技术,但是这种分析技术真正成功与否是要看它们会遭遇什么样的攻击。
Though, at first glance, optimizing away the effects of metamorphic transformations looks like a promising technique, the real test of such analysis techniques depends on how they can be attacked.
应用推荐