Based on these information, make the attack code accepts the buffer boundary check, stack boundary check, return address check and jump instruction check, intercept attacks on the key nodes of buffer overflow attacks, enhance system dynamic security. 依据这些信息,对攻击行为执行缓冲区边界检查,栈边界检查,返回地址保护和跳转指令检查,在缓冲区溢出攻击流程的关键节点拦截攻击,增强系统运行过程中的安全性。