这样将保护程序代码避免堆栈、缓冲区和函数指针溢出,而且全都不需重新编译。
This protects against stack, buffer, and function pointer overflows, all without recompilation.
开发人员不必担心基于c语言的PHP实现中出现的分段(segmentation)错误和c指针溢出。
Developers do not have to worry about segmentation faults and C pointer overruns seen in C-based PHP implementations.
或在添加到当前指针时导致溢出。
可以检测内存泄漏、内存写溢出、释放野指针和内存管理函数的不匹配等问题。
The module can detect memory leak, write overflow, free wild pointer and mismatch using of memory functions of the executable files.
由于C语言允许通过指针进行间接内存访问,但并不进行边界检查,因此可能存在缓冲区溢出。
The C language allows indirect access memory location by pointer without boundary check, which may cause buffer overflow.
为了进行静态缓冲区溢出分析,必须首先进行高效而精确的指针分析,以确定指针可能指向的目标缓冲区。
In order to statically analyze buffer overflow, efficient and precise pointer analysis must be performed to make certain what target buffer a pointer variable point to.
为了进行静态缓冲区溢出分析,必须首先进行高效而精确的指针分析,以确定指针可能指向的目标缓冲区。
In order to statically analyze buffer overflow, efficient and precise pointer analysis must be performed to make certain what target buffer a pointer variable point to.
应用推荐