Method and apparatus for preventing overflow attack of buffer area
A buffer overflow and base address technology, applied in the field of network security, can solve problems such as the difficulty of effectively defending against buffer overflow attacks, and achieve the effect of preventing malicious attacks and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
[0024] Buffer overflow refers to when the number of data bits filled by a computer program into the buffer exceeds the capacity of the buffer itself, and the overflowed data is overwritten on the legitimate data. Ideally, the program checks the data length and does not allow input of a string that exceeds the length of the buffer. But most programs will assume that the data length always matches the allocated storage space, which brings the possibility of buff...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
