咨询与建议

限定检索结果

文献类型

  • 1 篇 学位论文
  • 1 篇 会议

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1 篇 工学
    • 1 篇 计算机科学与技术...
    • 1 篇 软件工程

主题

  • 2 篇 shell code
  • 1 篇 smart card
  • 1 篇 buffer overflow
  • 1 篇 self modifying c...
  • 1 篇 stack frame
  • 1 篇 system call tabl...

机构

  • 1 篇 delhi technologi...
  • 1 篇 univ mohammed 5 ...
  • 1 篇 inria lhs pec f-...

作者

  • 1 篇 kushal ahuja
  • 1 篇 el hajji said
  • 1 篇 lanet jean-louis
  • 1 篇 el janati el idr...

语言

  • 2 篇 英文
检索条件"主题词=Shell Code"
2 条 记 录,以下是1-10 订阅
排序:
Countermeasures Mitigation for Designing Rich shell code in Java Card  1st
Countermeasures Mitigation for Designing Rich Shell Code in ...
收藏 引用
1st International Conference on codes, Cryptology, and Information Security (C2SI) In Honor of Thierry Berger
作者: El Janati El Idrissi, Noreddine El Hajji, Said Lanet, Jean-Louis Univ Mohammed 5 Fac Sci Lab Math Comp & Applicat Rabat Morocco INRIA LHS PEC F-35042 Rennes France
Recently, it has been published that Java based smart cards are still exposed to logical attacks. These attacks take advantage of the lack of a full verification and dynamically use a type of confusion. Countermeasure... 详细信息
来源: 评论
" Boundary Exploitation Overflow Preventive "
" Boundary Exploitation Overflow Preventive "
收藏 引用
作者: Kushal Ahuja DELHI TECHNOLOGICAL UNIVERSITY
学位级别:硕士
Buffer overflow continues to be one of the leading vulnerabilities that plague the software industry. Buffer overflow as the name suggests results because software may potentially allow operation, such as reading or w... 详细信息
来源: 评论