首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到17条相似文献,搜索用时 78 毫秒
1.
本文主要介绍Detours的功能、原理、使用方法,并以一个具体的实例说明如何使用Detours拦截Win32 API函数。  相似文献   

2.
文章介绍了Detours Win32API拦截技术及其应用。Detours能在不涉及源代码改动且不得新编译整个系统的情况下扩充现有的系统功能,它能在运行态动态的拦截x86机器上的任意Win32二进制函数,在证券业资讯分析软件开发中应用了该项技术,使得分析软件捕获行情数据实时性较强,不会发生数据丢失现象。  相似文献   

3.
本文主要介绍Detours的功能、原理、使用方法,并以一个具体的实例说明如何使用de-tours拦截Win32API函数。  相似文献   

4.
苏雪丽  马金鑫  袁丁 《计算机应用》2010,30(12):3423-3426
研究了两种文件操作监控常用的API钩挂技术,通过实验指出IAT Hook技术的不稳定性,提出使用基于Inline Hook技术的Detours来解决explorer.exe错误。最后给出了文件操作监控方案的实现方法,并对Detours技术进行了详细阐述。经测实验证,该方案确实能有效实现文件的安全保护。  相似文献   

5.
为了改变和扩充现有程序功能,完成实时数据采集,针对API函数截获技术进行了研究。对Windows API截获所采用的关键技术及其工作原理作了详细说明,给出了利用远程线程打破进程边界的方法,对PE文件的引入函数表格式进行剖析,并介绍了Detours技术的实现原理。在某数据管理系统的软件改造项目中,运用该项技术成功实现了实时数据采集,完成了对已有软件系统的功能升级。  相似文献   

6.
Windows下两种API钩挂技术的研究与实现   总被引:1,自引:0,他引:1  
详细阐述了两种API钩挂技术IAT(import address table) Hook和Inline Hook的基本原理,给出了各自的实现方法.通过实验,指出IAT Hook在文件操作监控时存在的不稳定现象,比如explorer.exe错误.提出用基于Inline Hook的Detours技术弥补IAT Hook的缺陷,并给出了实现方法.实验结果表明,该方法能有效实现稳定可靠的API钩挂,Inline Hook是一种比较好的API钩挂技术.  相似文献   

7.
本文通过对FoxPro的低级文件函数介绍与说明,提出了利用这些低级函数进行文件的低层操作,实现FoxPro通常不能达到的功能,特别是这些功能具有一定的可行性和实用性,象阅读文件、加密数据库、转换字段名,实现通信都是我们平时所要用到的,具有一定的启发性。  相似文献   

8.
函数逼近问题一直是模式识别领域的热点,单一函数逼近模型已经能够有效地逼近非线性曲线,但无法实现对多条曲线的同时逼近。本文应用组合函数逼近模型实现了对多条曲线的同时逼近。  相似文献   

9.
本文结合雷达模拟器的设计实现,讨论了在Windows2000环境下实现串口通信编程的方法,并通过以API函数编写的程序为实例,分析了利用线程控制读写的方法.并给出其具体实现过程,成功地实现了PC机与DSP接口之间的串行通信。该实现方法适用于一般的串口通信.具有一定的代表性。  相似文献   

10.
多线程技术在串口通信中的应用及实现   总被引:8,自引:1,他引:8  
本文介绍了多线程技术的基本原理和串口通信的函数,提出了在Windows环境下实现串口通信的一般方法和步骤,提高了系统的可靠性和实时性。  相似文献   

11.
This article demonstrates that the Bellcore OSCA architecture can serve as a basis for the metaarchitecture for software architectures that must support interoperability among functionality that traditionally has resided in operation systems and functionality that traditionally has resided in network elements (NE) (i.e., interoperability among operations functionality and network functionality). The need for this interoperability is driven by such telephone company business needs, as the need for customers to access operations capabilities spanning operations systems and NEs, the need for new service offerings to span operations systems and NEs, the need for a flexible environment for service development, and the need to manage all corporate data as a company resource. As a result, it is becoming beneficial to apply interoperability requirements to the network functionality that interfaces with operations systems. Therefore, it is reasonable to apply the OSCA architecture to network functionality. This article applies the OSCA architecture interoperability principles of separation of concerns to current and emerging network functionality. It demonstrates that this functionality can be partitioned among the three OSCA architecture layers of corporate data, processing, and user, and that there are a number of benefits to applying the OSCA interoperability principles to network functionality.  相似文献   

12.
13.
The principal concepts, models and methods for software quality evaluation are presented. Since the definitions of functionality in the existing standards for software quality evaluation are inconsistent, this concept here is defined as a particular case of the concept of quality in qualimetry as applied to software quality evaluation. A generalized model for software functionality evaluation is proposed. A functionality evaluation model for machine translation systems that was developed based on it and can be a prototype for more detailed models is given. Some ways to use such models to evaluate the functionality of machine translation systems numerically are considered.  相似文献   

14.
A central goal of computer graphics is to provide tools for designing and simulating real or imagined artifacts. An understanding of functionality is important in enabling such modeling tools. Given that the majority of man‐made artifacts are designed to serve a certain function, the functionality of objects is often reflected by their geometry, the way that they are organized in an environment, and their interaction with other objects or agents. Thus, in recent years, a variety of methods in shape analysis have been developed to extract functional information about objects and scenes from these different types of cues. In this report, we discuss recent developments that incorporate functionality aspects into the analysis of 3D shapes and scenes. We provide a summary of the state‐of‐the‐art in this area, including a discussion of key ideas and an organized review of the relevant literature. More specifically, the report is structured around a general definition of functionality from which we derive criteria for classifying the body of prior work. This definition also facilitates a comparative view of methods for functionality analysis. We focus on studying the inference of functionality from a geometric perspective, and pose functionality analysis as a process involving both the geometry and interactions of a functional entity. In addition, we discuss a variety of applications that benefit from an analysis of functionality, and conclude the report with a discussion of current challenges and potential future works.  相似文献   

15.
This paper proposes a formal method, based on Circus, for developing software systems that respect a joint specification of functionality and confidentiality attributes. We extend the semantics of Circus to capture the information that users can infer about a system’s behaviour, enabling confidentiality and functionality attributes of a system to be specified together. We represent inconsistencies between functionality and confidentiality properties as miracles, rendering insecure functionality infeasible. We present techniques for verifying that a system design’s functionality and confidentiality attributes are mutually consistent, and for ensuring that consistency is maintained by refinement steps.  相似文献   

16.
An innovative middleware‐transparent approach to developing distributed applications is presented. The approach uses an aspect‐oriented software development technique to separate an application's middleware‐independent functionality from its middleware‐specific functionality. Application elements that are specific to the middleware are localized in aspects that can be seamlessly integrated into middleware‐independent application designs. The middleware‐transparent approach is used to decouple business functionality from middleware‐specific functionality. The decoupling allows developers to change middleware application elements without significantly modifying business functionality. Middleware technologies such as Java Remote Method Invocation (RMI), Jini, Simple Object Access Protocol (SOAP) remote procedure call (RPC) and .Net are used as examples to illustrate the approach. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   

17.
Abstract— We investigated the effect of monomer functionality on the electro-optic performance of holographically formed polymer-dispersed liquid crystals. Oligomers of functionality 2, 3, and 6 are mixed to yield oligomers of intermediate functionality. Reflection efficiency and critical field peaks are reported for an effective functionality of ~4.5 SEM studies, allowing us to correlate these results to polymer morphology.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号