期刊文献+

特洛伊木马隐蔽性研究 被引量:1

Research on Trojan Horse Concealing
下载PDF
导出
摘要 从木马原理出发,分析了几种木马隐藏方法,并对各自优缺点做了简要评论。 Based on the principle of Trojan horse,the paper analyzes several kinds of Trojan horse concealing,and briefly discusses their advantages and disadvantages.
作者 孟蕾
出处 《电脑学习》 2007年第5期4-5,共2页 Computer Study
关键词 木马 隐蔽性 端口 反弹 溢出植入 Trojan Horse Concealing Port Rebound Overflow Planting
  • 相关文献

参考文献3

二级参考文献16

  • 1Kumar Avijit,Prateek Gupta,Deepak Gupta.TIED,LibsafePlus:Tools for Runtime Buffer Overflow Protection.Department of Computer Science and Engineering Indian Institute Of Technology,Kanpur 被引量:1
  • 2John Viega,J T Bloch,Tadayoshi Kohno et al.ITS4:A Static Vulnerability Scanner for C and C++ Code.Reliable Software Technologies 被引量:1
  • 3Kyung-suk Lhee,Steve J Chapin.Type-Assisted Dynamic Buffer Overflow Detection.Center for Systems Assurance Syracuse University 被引量:1
  • 4Terry Bruce Gillette.A Unique Examination of the Buffer Overflow Condition.Florida Institute of Technology 被引量:1
  • 5Stelios Sidiroglou,Angelos D Keromytis.Using Execution Transactions To Recover From Buffer Over_ow Attacks.Columbia University 被引量:1
  • 6Eric Haugh,Matt Bishop.Testing C Programs for Buffer Overflow Vulnerabilities.University of California 被引量:1
  • 7Alfred Aho,Ravi Sethi,Jeffrey D.Ullman Compilers Principles,Techniques,and Tools 被引量:1
  • 8Andy Ju,An Wang.security testing in software engineering courses[C].In:34th ASEE/IEEE frontiers in education conference,2004; 10:20~23 被引量:1
  • 9Aishwarya Iyer,Lorie M Liebrock.Vulnerability Scanning for Buffer Overflow[C].In:Proceeding of the International Conference on Information Technology:Coding and Computing,2004 被引量:1
  • 10金山公布2004年度十大“木马”病毒[EB/OL].www.bjbusiness.com.cn,2004. 被引量:1

共引文献26

同被引文献3

引证文献1

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部