提出了一个静态分析,动态验证的安全漏洞检测模型。
Propose a security vulnerabilities detection model which use static analysis and dynamic verification strategy.
缓冲区溢出漏洞检测技术是信息安全研究的一个重要分支。
Buffer overflow detection technology is an important branch of information security research.
分析了黑客入侵计算机网络系统的手段,提出并设计出一种新型漏洞检测系统。
By analyzing the means used by hackers to invade computer network systems, a new type of leak detection system is introduced and implemented.
依据漏洞检测的要求和实现的特点,构造一个分布式扫描任务调度模型,提出相应的扫描任务分配算法。
Based on the request and character of hole detection technology, this article establishes a distributing scanning task scheduling model, describes a scanning task distributing algorithm.
论文通过对漏洞检测技术和中间件技术的研究,结合两者的特点,提出了一个漏洞检测中间件的系统结构。
By research on the middleware technology and vulnerability detection technology, this paper presents an architecture of security hole detection middleware.
可编程逻辑器件安全性漏洞检测平台正是为了检测出逻辑芯片内可能存在的攻击后门和设计缺陷而研制的,从而确保电子设备中信息安全可靠。
This paper is aimed at detecting the backdoor attacks and design defects which might be embedded in logic chips, so as to insure the salty and creditability of the information in electronic equipment.
这些正被谈论的的文章和视频背后的制作团队并没有提到这个系统,也没有提到它是否检测到了它们的漏洞。
The team behind the article and video in question make no mention of the system, or whether or not it detected them.
应在公司用于检测漏洞和保护s OA基础结构的业务策略中包含用于目标和攻击者之间的多个SOA的深度防御模型。
A defense in depth model with multiple SOAs between the target and the adversary should be part of a company's business strategy for detecting vulnerability and protecting SOA infrastructure.
此类工具称为漏洞检查工具,它们能预先检测出潜在的漏洞。
Such tools, called vulnerability checking tools, detect the potential vulnerabilities in advance.
在这篇文章的后面部分,您将学习各种控制和自动操作这些行为的方法,当Purify检测记忆错误或者漏洞的时候就会采取这些行为。
Later in this article, you will learn about various ways of controlling and automating the actions to be taken when Purify detects memory errors or leaks.
该报告提供有关检测到的每个漏洞的大量信息,包括对处理特定exploit的OWASP页面的引用。
This report provides a great deal of information regarding each vulnerability detected, including a reference to the OWASP page that deals with the specific exploit.
造成这一漏洞的直接原因是,Sendmail的一个安全检测是有缺陷的,可以发生缓冲区溢出。
The immediate cause of the vulnerability was that one of Sendmail's security checks was flawed, permitting a buffer overflow.
另外微软还发布了基因码检测(genericsignature)信息来帮助用户对付这些漏洞,它的名称是Exploit:Win32/Apptom.gen,通常这些攻击文件将阻止用户打开Windows Live OneCare或者Forefront Client Security软件。
We are also releasing today a generic signature to protect our customers against these exploits. Its name is Exploit:Win32/Apptom.gen.
这些工具检测出的最常见的漏洞之一就是程序员忘记对潜在的恶意输入调用消毒例程。
One of the most common vulnerabilities that these tools detect is when programmers forget to call a sanitation routine on potential malicious input.
不幸的是,抽象是有漏洞的:例如,在我的ZIP代码验证器中,本想使用正则表达式执行检测。
Unfortunately, the abstraction is leaky: in my ZIP code validator, for example, I would have liked to use regular expressions to perform the check.
由新西兰安全研究者Simon Howard运营的备受争议的“零病毒检测”竞赛允许各个参赛队伪装计算机病毒代码和漏洞利用代码样本。
The controversial Race to Zero contest, run by New Zealand security researcher Simon Howard, allowed each team to try to obfuscate real computer viruses and exploit code samples.
随后,目的是检测恶意软件,使用的是漏洞或弱点。
Subsequently, the aim is to detect a malware that is using an exploit or vulnerability.
在进行入侵检测技术的研究中,安全漏洞分类是一个重要和必需的过程。
In the process of studying intrusion detection technology, the vulnerability taxonomy is an important and necessary process.
网络安全评价是一复杂的系统工程,现有的安全评估工具大都只是用于对网络系统安全漏洞进行扫描、检测。
Network security assessment is a complex system engineering. Most of current security evaluation tools are only used to scan and detect the security vulnerabilities of network system.
本文首先论述了漏洞的定义、成因、特征、属性、分类和检测方法等。
This article firstly discusses the definition, source, characteristic, attribute and detecting methods of vulnerability.
现有的采用基于源代码分析的漏洞静态检测方法中存在的主要问题是误报率和漏报率较高。
The main problem of existing static vulnerability detection methods based source code analysis is their high false positive and false negative rates.
CVE 体系结构的建立对理解、避免、检测和消除计算机系统漏洞具有理论和实践意义。
This CVE structure is valuable for the understanding, avoiding, detecting and removing of vulnerabilities and exposures.
建立了填埋场渗漏检测高压直流电法漏洞电流模型。
A new leak current model of high voltage DC leak detection is developed.
检测系统配置的正确性和安全漏洞,并提示管理员修补漏洞。
Testing the correctness of the system configuration and security holes, and prompts the administrator to fix vulnerabilities.
利用形式化分析密码协议的方法来检测密码协议中潜在的安全漏洞,已成为密码学中一个新的研究方向。
It is a new study direction of cryptograph that detecting potential flaws in cryptographic protocols using formal analysis of cryptographic protocol.
简要介绍了网络存在的安全漏洞和常规安全体系,重点对入侵检测作了分析。
In this paper, the security loopholes in the network and the normal security infrastructure are briefly introduced, and the intrusion detection system is analyzed emphatically.
这个模式是必须的,例如,一些在本地网络上检测性能或者安全漏洞的应用程序。
This mode is needed, for instance, by applications that check performance or security breaches on their local network segment.
OS扫描是黑客进行OS漏洞攻击的前奏,实时检测OS扫描是防止系统遭受OS漏洞攻击的重要手段。
OS scanning is the prelude of hacker's attack by using OS vulnerability. Real-time detection of OS scanning is one main measure against hacker's intrusion using OS vulnerabilities.
目前大多数的源码安全审计工具在整型错误的检测上具有局限性,往往只能检测整型溢出类型的漏洞。
However currently, most of the source code auditing tools have limitation in detecting integer flaws, which can only detect integer overflow.
文中分析了防止缓冲区溢出攻击的运行时方法的不足。介绍了一种静态检测缓冲区溢出漏洞的方法及工具。
In this paper, first analyzes the shortcomings of run-time defenses of buffer overflow attacks, and then presents an approach and a tool to statically detect buffer overflow vulnerabilities.
应用推荐