Abstract
The overflow-type web page malicious codes can activate malicious codes by using the overflow vulnerability of the programmes in the users' host computers, which will harm the Internet users greatly. In order to study their mechanisms, this paper analyzes the typical overflow script and track their operation changes in RAM, finds out the specific details and conditions required for activating overflow-type web page malicious codes, analyzes their general design principle, and obtains their general design method of triggering a vulnerability in the operating system software. Finally, some suggestions to prevent the overflow-type web page malicious codes are presented.
Original language | English |
---|---|
Pages (from-to) | 832-836 |
Number of pages | 5 |
Journal | Binggong Xuebao/Acta Armamentarii |
Volume | 31 |
Issue number | 6 |
Publication status | Published - Jun 2010 |
Keywords
- Computer science and technology
- Overflow vulnerability
- Overflow-type web page malicious code
- Web page malicious code