Font Size: a A A

Research Of Mining And Analyzing Technology Of Windows Critical Vulnerabilities

Posted on:2007-08-20Degree:MasterType:Thesis
Country:ChinaCandidate:J CaoFull Text:PDF
GTID:2178360185994515Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
In recent years, some information security technologies and relevant products have already obtained breakthrough development, but research of technology in software vulnerabilities remains passive and laggard. Meanwhile, with the global prevail of Windows Operation System (OS), vulnerabilities based on this OS are emerging in endlessly, and the effect caused by critical vulnerabilities is the most serious. Therefore, researching technology of Windows critical vulnerability is gradually coming into the eyeshot of the security researchers.A critical vulnerability means its exploitation could allow the propagation of an Internet worm without user action, and it is caused data processing error in a software. The Microsoft severity rating system provides a single rating for any vulnerability, and the word 'critical' describes the most serious rating. If hackers make use of this vulnerability successfully, they can take an attack without the system user's attention, and control the OS with the current user's permission.The researching technology of critical vulnerability includes vulnerability mining and vulnerability analyzing. Vulnerability mining technology means seeking for unknown vulnerabilities, applying various kinds of technologies and tools for potential vulnerabilities in software. Vulnerability analyzing technology means deep analysis on the vulnerabilities discovered, making a good base for the management of the vulnerabilities. Mastering the researching technology of critical vulnerability...
Keywords/Search Tags:Vulnerability mining, Vulnerability Analyzing, protocol shielding, pattern comparing
PDF Full Text Request
Related items