Journals
Publish with us
Publishing partnerships
About us
Blog
Wireless Communications and Mobile Computing
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Wireless Communications and Mobile Computing
/
2020
/
Article
/
Tab 1
/
Research Article
An Invocation Chain Test and Evaluation Method for Fog Computing
Table 1
Detection pattern of acquisition root access permissions adopting remote memory overflow.
Name
Re_bof
Class
Vuls
CVE-2003-0245, CVE-2006-2372, CVE-2006-6424, CVE-2006-0026, CVE-2006-2451
Var
:
HostID,
:
HostID,
sn
: ServiceName,
cveid
: CveID,
pro
: Protocol,
port
: Port
Pre
NetworkService(
,
sn
,
pro
,
port
), VulExists(
,
sn
,
cveid
), Connection(
,
,
pro
,
port
), RunCode(
,
ROOT
)
Eff
RunCode(
,
ROOT
), DoS(
,
sn
)