期刊文献+

如何发现游戏软件中的漏洞并制作补丁

下载PDF
导出
摘要 靠程序员编写而成的游戏软件,被玩家发现存在漏洞已经屡见不鲜,游戏漏洞有硬件漏洞和软件漏洞之分,也有良性漏洞和恶性漏洞之分。因此,该文对游戏软件漏洞的概念进行简单概述,举以多种实例对游戏软件漏洞予以说明,较为详细地分析了寻找游戏软件漏洞的方法及其实行过程,分别阐述了游戏补丁的作用和游戏补丁的制作过程。
作者 田韬伟
机构地区 湖北襄阳四中
出处 《科技创新导报》 2016年第18期86-87,共2页 Science and Technology Innovation Herald
  • 相关文献

参考文献3

二级参考文献27

  • 1罗谦,舒辉,曾颖.二进制文件结构化比较的并行算法实现[J].计算机应用,2007,27(5):1260-1263. 被引量:4
  • 2Flake H. Structural comparison of executable objects [C]// Proceedings of the IEEE Conference on Detection of Intrusions, Malware, and Vulnerability Assessment. Dortmund, Germany: SIG SIDAR, 2004.
  • 3Sabin T. Comparing binaries with graph isomorphisms [Z/OL]. (2011-06 25), http= //razor. bindview. com/publish/papers/comparing-binaries, html, 2004.
  • 4Brumley D, Poosankam P, Song D, Jiang Z. Automatic patch-based exploit generation is possible: Techniques and implications, security and privacy [C]// Proceedings of the IEEE Symposium on Security and Privacy. California, USA: IEEE Computer Society, 2008:143 -157.
  • 5eEye Security. eEye binary diffing suite (EBDS) [Z/OL]. (2011-06-25), http://research. eeye. com/html/tools/ RT20060801 1. htm 1. Version 1.0.5.
  • 6Brumley D, Caballero J, Liang Z, Newsome J, Song D. Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation [C]// Proceedings of the USENIX Security Symposium. Boston, USA: USENIX, 2007.
  • 7Software Security Research. Group, School of Software and Mieroelectronics, Peking University. [Z/OL]. (2011 06-25), http : / / www. pku-exploit, corn/.
  • 8Microsoft Corporation [Z/OL]. (2011-06-25), http: //tcchnet. microsoft, com/en-us/security/bulletin/mslO - 015.
  • 9Microsoft Corporation [Z/OL]. (2011-06-25), http microsoft, com/en us/security/bulletin/ms11- 010.
  • 10Microsoft Corporation [Z/OL]. (2011-06-25), http: microsoft, com/en us/security/bulletin/ms10 - 011.

共引文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部