期刊文献+

系统漏洞挖掘技术探讨

System vulnerabilities mining techniques discussed in this paper
原文传递
导出
摘要 进入新世纪以来,我国科学技术得到较快的发展,其中互联网网络技术作为现阶段较为普遍的技术之一,给人们的日常生活带来较大的变化,在很多方面方便了人们的日常生活。但是随着各种网络技术的发展,其中表现出的漏洞也逐步增多,系统漏洞作为现阶段漏洞的主要部分,全面实现系统漏洞的挖掘对于保护整个互联网的安全有着非常重要的意义。本文中笔者结合自身多年系统漏洞挖掘经验,简要分析了系统漏洞的挖掘技术。供各位网络安全维护人员参考,以共同提高我国网络攻防技术的能力水平。 since entering the new century, our country get faster development of science and technology, the Intemet network technology, as one of the common technology at present stage, to People's Daily life bring larger change, convenient for People's Daily life in many ways.But with the development ofaU kinds of network technology, which show that the increase in the number of holes also gradually, system vulnerabilities as the main part of the hole at the present stage, the comprehensive implementation system vulnerahilities of digging for the protection of the safety of the Internet has very important significance.In this article, the author combined with their own system vulnerabilities mining experience for many years, the brief analysis of the mining technique system vulnerabilities.Reference for each network security maintenance personnel, in order to jointly improve the ability of network attack and defense technology level in China.
出处 《网络安全技术与应用》 2014年第9期113-113,116,共2页 Network Security Technology & Application
关键词 系统漏洞 挖掘技术 网络安全 system vulnerabilities, Mining technology Network security
  • 相关文献

参考文献1

二级参考文献15

  • 1Wikipedia. ActiveX-Wikipedia, the Free Encyclopedia[EB/OL].http://en.wikipedia.org/wiki/ ActiveX,2010.
  • 2Microsoft Corporation. Microsoft Component Object Model (COM):A Technical Overview of COM[EB/OL].http://www.cs.umd.edu/~pugh/com/,2010.doi:10.1160/TH09-07-0476.
  • 3Egele M,Wurzinger P,Kruegel C. Defending browsers against driven-by downloads: Mitigating heapspraying code injection attacks[A].Beilin:Springer-Verlag,2009.88-106.
  • 4Microsoft Corporation. Microsoft Security Intelligence Report Volume 8[EB/OL].http://www.microsoft.com/downloads/details.aspx?farnilyid =2C4938A0-4D64-4C65-B951-754F4D1AF0B5&displaylang =en,2010.doi:10.1016/j.bpj.2010.01.045.
  • 5National Institute of Standards and Technology. National Vulnerability Database Home[EB/OL].http://nvd.nist.gov/,2010.
  • 6Hird S. axfuzz:An ActiveX/COM Enumerator and Fuzzer[EB/OL].http://sourceforge.net/projects/axfuzz/,2010.
  • 7iDefense Labs. COMRaider:A tool designed to fuzz COM obiect Interfaces[EB/OL].http://labs.idefense.com/software/fuzzing.php # more_comraider,2010.doi:10.1016/j.molcel.2011.07.029.
  • 8Moore H. AxMan ActiveX Fuzzer[EB/OL].http://digitaloffense.net/tools/axman/,2010.
  • 9CERT Coordination Center. Dranzer[EB/OL].http://www.cert.org/vuls/discovery/dranzer.html,2010.
  • 10Dormann W,Plakosh D. Vulnerability Detection in ActiveX Controls Through Automated Fuzz Testing[EB/OL].http://www.cert.org/archive/pdf/dranzer.pdf,2010.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部