助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   漏洞挖掘 的翻译结果: 查询用时:0.326秒
图标索引 在分类学科中查询
所有学科
计算机软件及计算机应用
互联网技术
更多类别查询

图标索引 历史查询
 

漏洞挖掘
相关语句
  “漏洞挖掘”译为未确定词的双语例句
     Research of Mining and Analyzing Technology of Windows Critical Vulnerabilities
     Windows危急级漏洞挖掘及分析技术研究
短句来源
     Research of Vulerability Detection and Usage under Win32 Plateform
     基于Win32平台的漏洞挖掘和漏洞利用技术研究
短句来源
     Research on Discovering Software Vulnerabilities Based on Reverse Engineering
     基于逆向工程的软件漏洞挖掘技术
短句来源
     So digging for valuable information is based on vulnerability database.
     该框架以漏洞数据库为平台,将漏洞研究的各个方面有机结合,希望结束漏洞挖掘“小作坊”的时代进入到“大生产”时代。
短句来源
     Vulnerability analyzing technology means deep analysis on the vulnerabilities discovered, making a good base for the management of the vulnerabilities. Mastering the researching technology of critical vulnerability
     本文分析了传统漏洞研究技术的基本原理及存在的缺陷,有针对性地提出了一种新的漏洞挖掘及分析技术,以及该技术在Windows2000/XP/2003平台上工程实现的设计方案,从而较大地提高了漏洞研究技术的实际应用价值。
短句来源
更多       
  相似匹配句对
     Research of Mining and Analyzing Technology of Windows Critical Vulnerabilities
     Windows危急级漏洞挖掘及分析技术研究
短句来源
     Research on Discovering Software Vulnerabilities Based on Reverse Engineering
     基于逆向工程的软件漏洞挖掘技术
短句来源
     Web Mining
     网络挖掘
短句来源
     WEB MINING
     Web挖掘
短句来源
     Research on Vulnerability Related Technologies
     漏洞相关技术研究
短句来源
查询“漏洞挖掘”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
没有找到相关例句


Discovering software vulnerability is an important part of network attack and defense technology. First, the origin and appli- ciation of reverse engineering and the methods of discovering software vulnerabilities based on reverse engineering are introduced; then, the rationale, characteristics, applicable field, merits and limits of 4 methodologies of discovering software vulnerabilitiy based on reverse engineering are discribed; Finally, a instance of how to discover buffer overflow software vulnerability...

Discovering software vulnerability is an important part of network attack and defense technology. First, the origin and appli- ciation of reverse engineering and the methods of discovering software vulnerabilities based on reverse engineering are introduced; then, the rationale, characteristics, applicable field, merits and limits of 4 methodologies of discovering software vulnerabilitiy based on reverse engineering are discribed; Finally, a instance of how to discover buffer overflow software vulnerability in helpctr.exe based on reverse engineering is presented.

软件漏洞挖掘是网络攻防技术的重要组成部分。首先介绍了逆向工程技术的起源、作用和基于逆向工程的软件漏洞挖掘技术的研究路线;然后描述了四种基于逆向工程的软件漏洞挖掘技术的原理、特性、适用范围和优缺点;最后给出一个实例,示范如何基于逆向工程技术挖掘helpctr程序中存在的缓冲区溢出软件漏洞。

Based on reverse deduction with proof-tree, a method for detecting SQL injection vulnerabilities which are ubiquitous in Web applications is presented.Differing from traditional real time security strategies such as IDS and firewall,the origin of producing attack can be found by directly mining source codes vulnerabilities.The essentials are to track reversely the variables that are related to database(DB) script operations and check whether they are influenced from outside so as to control the hidden damage...

Based on reverse deduction with proof-tree, a method for detecting SQL injection vulnerabilities which are ubiquitous in Web applications is presented.Differing from traditional real time security strategies such as IDS and firewall,the origin of producing attack can be found by directly mining source codes vulnerabilities.The essentials are to track reversely the variables that are related to database(DB) script operations and check whether they are influenced from outside so as to control the hidden damage existing in the DB operations.The experimental results show that the proposed method can accurately verify the security of 53.8% DB operations,and it is applicable for any type of Web application platforms configured with different script languages and database systems.

针对Web应用中普遍存在SQL注入漏洞等问题,提出了一种基于证明树反演的漏洞定位方法.该方法可对攻击产生的根源直接进行源代码的漏洞挖掘,其核心思想是:通过在脚本中反向追踪数据库操作所涉及的变量来检验其是否受到外界的影响,从而达到控制数据库操作的安全隐患.实验结果表明,所提方法能够准确验证53.8%的数据库操作的安全性,对于不能做出自动判定的风险操作,则能给出变量的依赖关系.该方法适用于以各种脚本语言和数据库系统搭建的Web应用平台.

 
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关漏洞挖掘的内容
在知识搜索中查有关漏洞挖掘的内容
在数字搜索中查有关漏洞挖掘的内容
在概念知识元中查有关漏洞挖掘的内容
在学术趋势中查有关漏洞挖掘的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社