首页 | 本学科首页   官方微博 | 高级检索  
     

剖析缓冲区溢出攻击
引用本文:盛娟,敬茂华. 剖析缓冲区溢出攻击[J]. 电脑编程技巧与维护, 2008, 0(13): 81-83
作者姓名:盛娟  敬茂华
作者单位:东北大学计算中心,秦皇岛,066004;东北大学秦皇岛分校计算机工程系,秦皇岛,066004
摘    要:本文从程序设计语言的特征、程序编写、数据结构以及程序执行控制等多个角度对缓冲区溢出漏洞攻击的原理进行深入剖析,最后提出了遏制利用缓冲区溢出漏洞进行攻击的一些措施。

关 键 词:缓冲区溢出  堆栈溢出  缓冲区溢出攻击

Exploit the Attacks Based on Buffer Overflow
SHENG Juan,JING Maohua. Exploit the Attacks Based on Buffer Overflow[J]. Computer Programming Skills & Maintenance, 2008, 0(13): 81-83
Authors:SHENG Juan  JING Maohua
Affiliation:SHENG Juan, JING Maohua ( 1. Computer Center of Northeastern University, Qinghuangdao, 066004; 2. Computer Engineering Department of Northeastern University, ,Qinghuangdao 066004)
Abstract:This paper describes and analyzes the technical principles of network attack based on buffer overflow, from the programming language's character , programming,data structure designing and program executing.At last, it presents some methods to prevent this kind of attacks.
Keywords:Buffer overflow  Heap and Stack attack  Buffer overflow attacks
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号