AP Notes, Outlines, Study Guides, Vocabulary, Practice Exams and more!

Chapter 10Computer Security Principles and Practice (Stallings/Brown) Flashcards

Terms : Hide Images
3842804802Buffer overflowA condition at an interface under which more info can be placed into a buffer or data holding area than the capacity allocated, overriding other information0
3842804803Stack buffer overflow/Stack smashingOccurs when the targeted buffer is located on the stack, usually is a local variable any functions stack frame1
3842804804Stack frameA structure on the stack that stores the return address during a function call, here It also stores locations and saves parameters to be passed to the function. Possibly register values too.2
3842804805Shell codeCode supplied by an attacker and often saved in the buffer being overflowed, so the attacker can transfer execution of the program to the Shell code3
3842804806Position independentA generic restriction on the content of shell code - this means it cannot contain any absolute address referring to itself, Because the attacker generally cannot determine in advance exactly where the target buffer will be located in the stack frame of the function which is defined.4
3842804807Restrictions on shell code1. It must be position independent 2. It cannot contain any null values5
3842804808NOP sledA run of an NOP commands with the return address in the middle somewhere, to deal with the inability to precisely determine the starting address to put the hackers code6
3842804809No - execute bitSupport from the processors memory management unit to tag pages of virtual memory as being non executable7
3842804810Guard pagesA runtime defense that can be used by placing these between critical regions of memory in the process address space8
3842804811Return to system callA variant attack in which the return address is changed to jump to existing code on the system9
3842804812Heap overflowsExploiting or flows and buffers located elsewhere in the process address space. One possible target is a buffer located in memory dynamically allocated from the heap.10
3842804813Replacement stack frameA variant of stack overflow, this attack overwrites the buffer and saved frame pointer address. The saved frame pointer value is changed to refer to a location near the top of the overwritten buffer, where a dummy stack frame has been created with a return address pointing to the shellcide lower in the buffer11

Need Help?

We hope your visit has been a productive one. If you're having any problems, or would like to give some feedback, we'd love to hear from you.

For general help, questions, and suggestions, try our dedicated support forums.

If you need to contact the Course-Notes.Org web experience team, please use our contact form.

Need Notes?

While we strive to provide the most comprehensive notes for as many high school textbooks as possible, there are certainly going to be some that we miss. Drop us a note and let us know which textbooks you need. Be sure to include which edition of the textbook you are using! If we see enough demand, we'll do whatever we can to get those notes up on the site for you!