- zhinengjiaju 很详细的关于智能家电与智能家居的资料
- chenxiaocen 盲信号分离(BSS)指在源信号混合和传输信道未知的情况下
- Digital-filters A filter is a system which modifies some special frequencies reletive to the others. As a result i s applicable in some applications when it is necessary to have different gains & phase shifts at different frequencies to perform specific filtering tasks. For example in an audio file which is corrupted by noise it is convinient to use a filter to cancel those frequencies which are affected by noise and consequently having a better sound quality. During this MATLAB experiment we are trying to cancel the noise frequencies out of the original signal frequencies to get the original signal. Due to do this task
- Simulink 基于的光伏电池组件建模和MPPT仿真研究.
- TPaJfB8c 易语言导弹拦截游戏
- 0841090 VB开发的信息管理系统
文件名称:WEB
-
所属分类:
- 标签属性:
- 上传时间:2013-01-05
-
文件大小:4.45kb
-
已下载:0次
-
提 供 者:
-
相关连接:无下载说明:别用迅雷下载,失败请重下,重下不扣分!
介绍说明--下载内容来自于网络,使用问题请自行百度
在针对ELF文件 PE文件(.exe与.dll)的漏洞挖掘过程中,出现了很多的漏洞挖掘
技术,但是针对PE文件 ELF文件的漏洞挖掘始终停留在了黑盒测试(包括单元黑盒测试)
源代码审计等办法.通过RATS等源代码审计软件可以找到部分源代码级别的漏洞信息,
但是毕竟源代码审计软件寻找的多数为strcpy memcpy等存在缓冲区溢出遗患的C函数,所以通过审计源代码的办法来进行漏洞挖掘是一个可能性系数很小的漏洞挖掘技术-Loopholes for the ELF file PE file (. Exe and. Dll) mining process, there has been a lot of loopholes in mining technology, but digging for loopholes in the PE file ELF file always stay in the black-box testing (including unit black box testing) The source code audit approach. RATS audit software source code can be found in the part of the source code level vulnerability information, but, after all, the audit software source code to find the majority of C function strcpy memcpy there a buffer overflow Aftermath, so by the audit source code approach to vulnerability mining is a very small probability coefficient loophole mining techniques
技术,但是针对PE文件 ELF文件的漏洞挖掘始终停留在了黑盒测试(包括单元黑盒测试)
源代码审计等办法.通过RATS等源代码审计软件可以找到部分源代码级别的漏洞信息,
但是毕竟源代码审计软件寻找的多数为strcpy memcpy等存在缓冲区溢出遗患的C函数,所以通过审计源代码的办法来进行漏洞挖掘是一个可能性系数很小的漏洞挖掘技术-Loopholes for the ELF file PE file (. Exe and. Dll) mining process, there has been a lot of loopholes in mining technology, but digging for loopholes in the PE file ELF file always stay in the black-box testing (including unit black box testing) The source code audit approach. RATS audit software source code can be found in the part of the source code level vulnerability information, but, after all, the audit software source code to find the majority of C function strcpy memcpy there a buffer overflow Aftermath, so by the audit source code approach to vulnerability mining is a very small probability coefficient loophole mining techniques
(系统自动生成,下载前可以参看下载内容)
下载文件列表
WEB漏洞挖掘技术.txt
本网站为编程资源及源代码搜集、介绍的搜索网站,版权归原作者所有! 粤ICP备11031372号
1999-2046 搜珍网 All Rights Reserved.