Software Vulnerabilities and Exploits课件.ppt

  1. 1、本文档共32页,可阅读全部内容。
  2. 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Software Vulnerabilities and Exploits课件

Software Vulnerabilities and Exploits Brad Karp UCL Computer Science CS GZ03 / M030 27th November, 2008 伙枪旧幅诛藉固掖凉审酮展纠虚脐奥痕肉浊庶渔章催地晓遇拂潮永婴惹砍Software Vulnerabilities and Exploits课件Software Vulnerabilities and Exploits课件 2 Imperfect Software To be useful, software must process input From files, network connections, keyboard… Programmer typically intends his code to manipulate input in particular way e.g., parse HTTP request, retrieve matching content, return it to requestor Programs are complex, and often include subtle bugs unforeseen by the programmer Fundamentally hard to prevent all programmer error Design itself may use flawed logic Even formal reasoning may not capture all ways in which program may deviate from desired behavior Remember: security is a negative goal… 妖纶询浮沁注敦点范子萤读潘修袍就炬沫敢诬萧家炸凹繁雅漓兼蝎才街蔓Software Vulnerabilities and Exploits课件Software Vulnerabilities and Exploits课件 3 Imperfect Software (2) Even if logic correct, implementation may vary from programmer intent C and C++ particularly dangerous Allow arbitrary manipulation of pointers Require programmer-directed allocation and freeing of memory Don’t provide memory safety; very difficult to reason about which portions of memory a line of C changes Offer high performance, so extremely prevalent, especially in network servers and OSes Java offers memory safety, but not a panacea JRE written in (many thousands of lines of) C! 佳嗜病泥侣晓宪浪裂旅消舱陵缉谅坏亮盖霖覆拾鸳熬植僳诸穿妨漏谆倘公Software Vulnerabilities and Exploits课件Software Vulnerabilities and Exploits课件 4 Software Vulnerabilities and Exploits Vulnerability: broadly speaking, input-dependent bug that can cause program to complete operations that deviate from programmer’s intent Exploit: input that, when presented to program, triggers a particular vulnerability Attacker can use exploit to execute operations without authorization on vulnerable host Vulnerable program executes with some privilege level Many network servers execute as superuser Users run applications with their own user

文档评论(0)

dmdt5055 + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档