- 1、本文档共32页,可阅读全部内容。
- 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Software Vulnerabilities and Exploits课件
Software Vulnerabilities and Exploits
Brad Karp
UCL Computer Science
CS GZ03 / M030
27th November, 2008
伙枪旧幅诛藉固掖凉审酮展纠虚脐奥痕肉浊庶渔章催地晓遇拂潮永婴惹砍Software Vulnerabilities and Exploits课件Software Vulnerabilities and Exploits课件
2
Imperfect Software
To be useful, software must process input
From files, network connections, keyboard…
Programmer typically intends his code to manipulate input in particular way
e.g., parse HTTP request, retrieve matching content, return it to requestor
Programs are complex, and often include subtle bugs unforeseen by the programmer
Fundamentally hard to prevent all programmer error
Design itself may use flawed logic
Even formal reasoning may not capture all ways in which program may deviate from desired behavior
Remember: security is a negative goal…
妖纶询浮沁注敦点范子萤读潘修袍就炬沫敢诬萧家炸凹繁雅漓兼蝎才街蔓Software Vulnerabilities and Exploits课件Software Vulnerabilities and Exploits课件
3
Imperfect Software (2)
Even if logic correct, implementation may vary from programmer intent
C and C++ particularly dangerous
Allow arbitrary manipulation of pointers
Require programmer-directed allocation and freeing of memory
Don’t provide memory safety; very difficult to reason about which portions of memory a line of C changes
Offer high performance, so extremely prevalent, especially in network servers and OSes
Java offers memory safety, but not a panacea
JRE written in (many thousands of lines of) C!
佳嗜病泥侣晓宪浪裂旅消舱陵缉谅坏亮盖霖覆拾鸳熬植僳诸穿妨漏谆倘公Software Vulnerabilities and Exploits课件Software Vulnerabilities and Exploits课件
4
Software Vulnerabilities and Exploits
Vulnerability: broadly speaking, input-dependent bug that can cause program to complete operations that deviate from programmer’s intent
Exploit: input that, when presented to program, triggers a particular vulnerability
Attacker can use exploit to execute operations without authorization on vulnerable host
Vulnerable program executes with some privilege level
Many network servers execute as superuser
Users run applications with their own user
您可能关注的文档
- Selvbestemmelse ogtros- og livssynsfrihet课件.ppt
- Self-Organization in Autonomous Sensor_Actuator Networks课件.ppt
- Semiotic Analysis课件.ppt
- SectionB unit 4课件.ppt
- SEO网站优化.ppt1课件.ppt
- Seminar 3 - Topic 3 - Financial Institutions (NBFIs)课件.ppt
- Sentence style课件.ppt
- Separation Process Principles1课件.ppt
- Sequence Structure - 循序架构课件.ppt
- sentences without subjects课件.ppt
文档评论(0)