相关文档

南京大学:《软件安全 Software Security》课程教学资源(PPT课件讲稿)Buffer Overflow Attack

Buffer Overflow:The Essentials Vulnerability Metrics What are Buffer Overflow? Basic Example Shellcode Definition Basic Example Shell-Spawning Shellcode A Real World Buffer Overflow Attack Key Point A vulnerability in Easy RM to MP3 Conversion How to hack the vulnerable program Integer Overflow Overview A Real World Example Common Patterns in Integer Overflow Heap Overflow What is the Heap? An Abstract Example
团购合买资源类别:文库,文档格式:PDF,文档页数:112,文件大小:8.54MB
点击进入文档下载页(PDF格式)
点击下载(PDF格式)