期刊文献+

面向网络对抗的防御虚拟机研究与实现 被引量:2

Research and implementation of defense of buffer overflow virtual machine based on computer network operation
下载PDF
导出
摘要 以缓冲区溢出为例,以面向网络对抗为研究背景,研究并实现一种虚拟机作为防御单元。实例表明,虚拟机能够很好地表现基于计算机网络的自组织协同对抗,实现防御的可控性,并用一阶逻辑给出正确性证明。 With the computer network operation as research and buffer overflow as example, researched and implemented a virtual machine to defense. Example shows that virtual machine can well present the self-organized coordinated information operation based on computer network. Lastly, proved it with logic.
出处 《计算机应用研究》 CSCD 北大核心 2008年第4期1154-1156,1210,共4页 Application Research of Computers
基金 国家“973”重点基础研究发展规划资助项目(2002CB312105)
关键词 网络对抗 缓冲区溢出防御 虚拟机 computer network operation buffer overflow defense virtual machine
  • 相关文献

参考文献7

  • 1SHELTON H. JP3-13: joint doctrine for information operations [ EB/ OL]. ( 1998- 10- 09 ). http://www. dtic. mil/doctrine/jel/new_ pubs/jp3_13. pdf.
  • 2李肖坚.一种计算机网络自组织的协同对抗模型.计算机研究与发展,2005,42:256-260.
  • 3BLUNDEN B.虚拟机的设计与实现:C/C++[M].杨涛,杨晓云,高文雅,等译.北京:机械工业出版社,2003:676.
  • 4VIEGA J, BLOCH J T, KOHNO Y, et al. ITS4: a static vulnerability scanner for C and C ++ code[ C ]//Proc of the 16th Annual Computer Security Applications Conference. New Orleans, Louisiana: Springer-Verlag, 2000 : 257.
  • 5LAROCHELLE D, EVANS. D. Statically detecting likely buffer overflow vulnerabilities[ DB/OL]. http://www. virginia. edu. PusenixO1. pdf.
  • 6COWAN C, BEATTIE S, JOHANSEN J,et al. PointGuard: protecting pointers from buffer overflow vulnerabilities [ C ]//Proc of the 12th USENIX Security Symposium. Washington DC : [ s. n ], 2003:4- 8.
  • 7JONES R, KELLY P. Bounds checking for C [ EB/OL ]. ( 1995 ). http://www, doe. ie. ae. uk/-phjk/Bounds Checking. html.

共引文献7

同被引文献5

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部