Second , based on security need analysis , i induce some insecure programming templates 然后从安全需求出发,归纳了一些常见的不安全编程的类型。
As we know , undocumented vulnerabilities are extremely important for network war . my main work focuses on three aspects : how security vulnerabilities are introduced , how to develop software to automate the finding process , and how to design general programming templates to exploit buffer overflow vulnerabilities 本论文的主要工作是研究漏洞发现和利用这个领域里一些规律性的东西,主要分析三个方面的问题:漏洞是如何产生的,如何开发一些工具来帮助我们查找漏洞,如何设计一个通用的模式来利用最常见的缓冲区溢出漏洞。