3842804802 | Buffer overflow | A condition at an interface under which more info can be placed into a buffer or data holding area than the capacity allocated, overriding other information | 0 | |
3842804803 | Stack buffer overflow/Stack smashing | Occurs when the targeted buffer is located on the stack, usually is a local variable any functions stack frame | 1 | |
3842804804 | Stack frame | A structure on the stack that stores the return address during a function call, here It also stores locations and saves parameters to be passed to the function. Possibly register values too. | 2 | |
3842804805 | Shell code | Code supplied by an attacker and often saved in the buffer being overflowed, so the attacker can transfer execution of the program to the Shell code | 3 | |
3842804806 | Position independent | A generic restriction on the content of shell code - this means it cannot contain any absolute address referring to itself, Because the attacker generally cannot determine in advance exactly where the target buffer will be located in the stack frame of the function which is defined. | 4 | |
3842804807 | Restrictions on shell code | 1. It must be position independent 2. It cannot contain any null values | 5 | |
3842804808 | NOP sled | A run of an NOP commands with the return address in the middle somewhere, to deal with the inability to precisely determine the starting address to put the hackers code | 6 | |
3842804809 | No - execute bit | Support from the processors memory management unit to tag pages of virtual memory as being non executable | 7 | |
3842804810 | Guard pages | A runtime defense that can be used by placing these between critical regions of memory in the process address space | 8 | |
3842804811 | Return to system call | A variant attack in which the return address is changed to jump to existing code on the system | 9 | |
3842804812 | Heap overflows | Exploiting or flows and buffers located elsewhere in the process address space. One possible target is a buffer located in memory dynamically allocated from the heap. | 10 | |
3842804813 | Replacement stack frame | A variant of stack overflow, this attack overwrites the buffer and saved frame pointer address. The saved frame pointer value is changed to refer to a location near the top of the overwritten buffer, where a dummy stack frame has been created with a return address pointing to the shellcide lower in the buffer | 11 |
Chapter 10Computer Security Principles and Practice (Stallings/Brown) Flashcards
Primary tabs
Need Help?
We hope your visit has been a productive one. If you're having any problems, or would like to give some feedback, we'd love to hear from you.
For general help, questions, and suggestions, try our dedicated support forums.
If you need to contact the Course-Notes.Org web experience team, please use our contact form.
Need Notes?
While we strive to provide the most comprehensive notes for as many high school textbooks as possible, there are certainly going to be some that we miss. Drop us a note and let us know which textbooks you need. Be sure to include which edition of the textbook you are using! If we see enough demand, we'll do whatever we can to get those notes up on the site for you!