Second , based on security need analysis , i induce some insecure programming templates 然后從安全需求出發(fā),歸納了一些常見的不安全編程的類型。
As we know , undocumented vulnerabilities are extremely important for network war . my main work focuses on three aspects : how security vulnerabilities are introduced , how to develop software to automate the finding process , and how to design general programming templates to exploit buffer overflow vulnerabilities 本論文的主要工作是研究漏洞發(fā)現(xiàn)和利用這個領(lǐng)域里一些規(guī)律性的東西,主要分析三個方面的問題:漏洞是如何產(chǎn)生的,如何開發(fā)一些工具來幫助我們查找漏洞,如何設(shè)計一個通用的模式來利用最常見的緩沖區(qū)溢出漏洞。