会议专题

A Self-rollback System for Vulnerability Attack

In the paper attacks in view of the procedure loophole, proposed when the procedure movement from restores and returns draws hack the method. First knows in the method to the procedure entrance point returns as the procedure draws hack the spot, next when procedure collapse distinguishes and locates the procedure loophole, finally analyzes between the loophole input and exterior input dependent relations distinguishes the triggering procedure loophole the procedure entrance point, and returns to this input point correspondence procedure draws back an achievement this procedure from to restore returns draws back the condition to carry on to the procedure draws back, causes the procedure to be possible to continue the normal operation. The experimental result indicated that, the method can succeed the recognition to attack to the realistic software loophole and completes the procedure from to restore draws back.

Computer security Loophole attack identify vulnerability program self-rollback

Hong GAN Dan PAN

Guangzhou City Construction College Guangzhou., China Guangzhou City Construction College Guangzhou , China

国际会议

2012 International Conference on Computer Science and Electronic Engineering(2012 IEEE计算机科学与电子工程国际会议 ICCSEE 2012)

杭州

英文

139-143

2012-03-23(万方平台首次上网日期,不代表论文的发表时间)