点击切换搜索课件文库搜索结果(7508)
文档格式:PDF 文档大小:797.41KB 文档页数:30
南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)07 Hashes and Message Digests
文档格式:PDF 文档大小:1.1MB 文档页数:17
南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)09 Authentication Using Symmetric Keys
文档格式:PDF 文档大小:242.05KB 文档页数:25
南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)11 Public-Key Infrastructure
文档格式:PDF 文档大小:1.89MB 文档页数:53
南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)13 Human Authentication
文档格式:PDF 文档大小:1.38MB 文档页数:90
1. Standard Bloom Filters 2. Compressed Bloom Filters 3. Counting Bloom Filters 4. Representation of a set of (key, f(key)) 5. Invertible Bloom Filters
文档格式:PDF 文档大小:796.86KB 文档页数:48
南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)17 Web Security(Cookies and Cross Site Scripting,XSS)
文档格式:PDF 文档大小:428.57KB 文档页数:40
南京大学:《网络安全与入侵检测 Network Security and Intrusion Detection》课程教学资源(课件讲稿)19 Firewall Design Methods
文档格式:PPTX 文档大小:1.25MB 文档页数:52
• Background • Software Security: Control-flow Hijack Attack ➢ Memory Layout , Stack frame, & Procedure ➢ Buffer Overflow: Vulnerability, & Defenses ➢ RILC, Return-Oriented Programming ➢ ASLR & CFI • Software Security: Non-control Data Attack ➢ Data Oriented Programming • Summary
文档格式:PDF 文档大小:2.28MB 文档页数:57
Background Control Flow Hijack Control Flow Hijack Defense Canary Defense StackGuard StackGuard Weakness DiffGuard Polymorphic Canary Data Execution Prevention Definition DEP Scorecard Return-to-libc Attack ASLR ASLR Randomization ASLR
文档格式:PPTX 文档大小:2.38MB 文档页数:58
• Threat Model • Control Flow Graph • Control Flow Integrity basic implementation – Build CFG – Instrumentation – Evaluation – Security and Adversary • Binary-CFI(CCFIR) – Introduce – Implementation – Context-Sensitive CFI
首页上页310311312313314315316317下页末页
热门关键字
搜索一下,找到相关课件或文库资源 7508 个  
©2008-现在 cucdc.com 高等教育资讯网 版权所有