Research Article

An Invocation Chain Test and Evaluation Method for Fog Computing

Table 1

Detection pattern of acquisition root access permissions adopting remote memory overflow.

NameRe_bof
Class
VulsCVE-2003-0245, CVE-2006-2372, CVE-2006-6424, CVE-2006-0026, CVE-2006-2451
Var: HostID, : HostID, sn: ServiceName, cveid: CveID, pro: Protocol, port: Port
PreNetworkService(, sn, pro, port), VulExists(, sn, cveid), Connection(, , pro, port), RunCode(, ROOT)
EffRunCode(, ROOT), DoS(, sn)