最后讨论如何根据溢出规律和植入代码的结构特征,采取有效措施来防御缓冲区溢出攻击。
At last discuss how to defense buffer overflow by the rule of buffer overflow and the structure character of injected code.
实际验证表明,该缓冲区溢出攻击描述语言能够动态地构造植入代码,实现缓冲区溢出攻击的自动化。
The actual verification shows that attack description language can correspondingly construct suitable embedded code and launch attack automatically.
最后,当要使用版本2时,一个开发人员想出了一个聪明的办法,使用元编程设计将国际化代码植入代码库中。
In the end, when it came time to work on version two, one of the developers had come up with a clever way, using metaprogramming, to weave the internationalization code into the code base.
尽管限制浏览器只浏览信任站点可以减少受到攻击的风险,恶意代码可以被植入任何的网站。
While restricting web surfing to trusted sites should reduce the risk of infection, the malicious code can be injected into any website.
尽管植入每种容器的代码可能相似,但容器本身反映了不同的能力、风格和整体哲学。
While the code that goes into each container may be similar, the containers themselves reflect different capabilities, styles, and overall philosophies.
添加代码以植入内容点。
向J sp添加代码以植入内容点。
这些代码一但被植入,就会不知不觉地在普通用户的电脑上生成一张自动的“病毒网络”---首先就是易受攻击的“脸谱”用户。
Once embedded, the code would have created a “botnet” of millions of zombie computers capable of launching all manner of scams on innocent folk—starting with gullible Facebook users themselves.
所以我们植入了一些错误校验,如果你愿意,在我们的执行代码里。
So we've embedded some error checking, if you will, into our implementations.
比如,植入了恶意代码的电表,能够扰乱输电网络——就像电脑的“僵尸网络”能够扰乱因特网一样。
Smart meters injected with malware, for instance, could disrupt the grid just as networks of PC botnets-home computers hijacked by viruses-now disrupt the Internet.
本文分析了这些问题,并给出了解决方案,提出了枚举变量适值计算规则的代码植入方案。
This article analyzes these problems and presents the solutions of code embedded in the rule of enumeration variable fitness calculation.
感染病毒是,病毒将自身程序代码植入其他执行文件(EXE)。
On a virus infection, the virus attaches its own program code to other executable files (. Exe).
该算法所处理的迷惑代码能够很好地抗击源代码静态分析和基于源代码植入反迷惑攻击。
The obfuscation algorithm can prevent the deobfuscation technique based on the static analysis of programs and by using program instrumentation.
该算法所处理的迷惑代码能够很好地抗击源代码静态分析和基于源代码植入反迷惑攻击。
The obfuscation algorithm can prevent the deobfuscation technique based on the static analysis of programs and by using program instrumentation.
应用推荐