可以有效地抵抗模仿攻击(Mimicry Attack)。如果入侵者企图绕过L-Call的检测,不仅要伪造系统调用,还需要伪造堆栈信息(最重要的是返回地址链),这大大增加了入侵的难度...
基于12个网页-相关网页
他的所有这些风格特征都受到攻击者模仿嘲弄。
All these peculiarities of his style have been parodied by his assailants.
但是,如果系统能接受一个听起来象“病人”一样类似的声音,则会给那些适当模仿系统有效用户的声音的攻击者钻空子。
However, if the system will accept a similar voice that sounds "sick," then it's more likely to fall prey to attackers who can reasonably mimic the voice of valid users of the system.
但是也引起了很多个人操盘的小公司的模仿和攻击。
But also caused a lot of individual small companies hailun imitation and attacks.
应用推荐