BLENDED ATTACKS EXPLOITS, VULNERABILITIES AND BUFFER-OVERFLOW TECHNIQUES IN COMPUTER VIRUSES

作者: Péter Ször , Eric Chien

DOI:

关键词: Focus (computing)Computer securityEngineeringBuffer overflowExploitHackerComputer virusEnd user

摘要: Exploits, vulnerabilities, and buffer-overflow techniques have been used by malicious hackers virus writers for a long time. However, until recently, these were not common place in computer viruses. The CodeRed worm was major shock to the antivirus industry since it first that spread as file, but solely memory utilizing buffer overflow Microsoft IIS. Many companies unable provide protection against CodeRed, while other with wider focus on security able solutions relief of end users.

参考文章(0)