• Listing 4. example2.c (vulnerable to a heap-based buffer overflow).

    清单4 . example2 . c(容易出现基于堆的缓冲区溢出)。

    youdao

  • Listing 1. example1.c (vulnerable to a heap-based buffer overflow).

    清单1 . example1 . c(容易出现基于堆的缓冲区溢出)。

    youdao

  • The following example is vulnerable to a heap-based buffer overflow

    以下示例容易出现基于堆的缓冲区溢出

    youdao

  • Listing 1 does not validate user-supplied data when copying it to the buffer member of the previously allocated struct mystruct using the strcpy function, resulting in a heap-based buffer overflow.

    使用strcpy函数用户提供数据复制先前分配struct mystruct的buffer成员中时,清单1验证用户提供的数据,造成堆中缓冲区溢出。

    youdao

  • Buffer overflow attack technology is a very efficient attack technology based on network.

    缓冲区溢出攻击技术一项十分有效的网络攻击技术。

    youdao

  • The attack, based on the buffer overflow, is a common means of security attacks and is the only most common security threats at present.

    基于缓冲区溢出攻击一种常见安全攻击手段也是目前惟一最重要最常见的安全威胁

    youdao

  • This paper presents a buffer overflow detection model based on intermedia assembly which can be used to perform static analysis and detection on executable files.

    提出一种基于中间汇编缓冲区溢出检测模型用于可执行代码进行静态分析检测。

    youdao

  • Based on current methods of anti-buffer overflow and the analysis of existing problems, the random fit algorithm was presented.

    对已有溢出防范技术及其存在问题进行分析提出了一种基于随机匹配算法的堆溢出防范策略。

    youdao

  • Based on current methods of anti-buffer overflow and the analysis of existing problems, the random fit algorithm was presented.

    对已有溢出防范技术及其存在问题进行分析提出了一种基于随机匹配算法的堆溢出防范策略。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定