Lec 8: Software Security 1: Implementation Vulnerabilities 1: Stack Flashcards
1
Q
When is a program secure?
A
![](https://s3.amazonaws.com/brainscape-prod/system/cm/165/739/251/a_image_thumb.png?1446024226)
2
Q
What is a software vulnerability?
A
![](https://s3.amazonaws.com/brainscape-prod/system/cm/165/739/278/a_image_thumb.png?1446024262)
3
Q
What is a buffer overflow?
A
![](https://s3.amazonaws.com/brainscape-prod/system/cm/165/739/312/a_image_thumb.png?1446024290)
4
Q
What makes buffer overflow attacks able to occur?
A
![](https://s3.amazonaws.com/brainscape-prod/system/cm/165/739/316/a_image_thumb.png?1446024328)
5
Q
What steps do you need to do to hijack control of a system?
A
![](https://s3.amazonaws.com/brainscape-prod/system/cm/165/739/339/a_image_thumb.png?1446024385)
6
Q
What do stack activations for C look like in memory?
A
![](https://s3.amazonaws.com/brainscape-prod/system/cm/165/739/359/a_image_thumb.png?1446024438)
7
Q
What does this example look like in Windows x86?
![](https://s3.amazonaws.com/brainscape-prod/system/cm/165/739/369/q_image_thumb.png?1446024479)
A
![](https://s3.amazonaws.com/brainscape-prod/system/cm/165/739/369/a_image_thumb.png?1446024501)
8
Q
Why is strcpy() unsafe?
A
![](https://s3.amazonaws.com/brainscape-prod/system/cm/165/739/404/a_image_thumb.png?1446024548)
9
Q
Why is it called shellcode?
A
- trying to run a shell
![](https://s3.amazonaws.com/brainscape-prod/system/cm/165/740/054/a_image_thumb.png?1446024581)
10
Q
What are some challenges for an buffer overflow attacker?
A
![](https://s3.amazonaws.com/brainscape-prod/system/cm/165/740/057/a_image_thumb.png?1446024628)
11
Q
What are some examples of string-based bufer overflows that have happened in history?
A
![](https://s3.amazonaws.com/brainscape-prod/system/cm/165/740/085/a_image_thumb.png?1446024671)
12
Q
Why are string-based buffer overflows able to happen? What are solutions to this problem?
A
![](https://s3.amazonaws.com/brainscape-prod/system/cm/165/740/359/a_image_thumb.png?1446024718)
13
Q
What is the problem with using strncpy() to prevent buffer overflows?
A
![](https://s3.amazonaws.com/brainscape-prod/system/cm/165/740/363/a_image_thumb.png?1446024790)
14
Q
![](https://s3.amazonaws.com/brainscape-prod/system/cm/165/740/367/q_image_thumb.png?1446024817)
A
![](https://s3.amazonaws.com/brainscape-prod/system/cm/165/740/367/a_image_thumb.png?1446024829)
15
Q
![](https://s3.amazonaws.com/brainscape-prod/system/cm/165/740/403/q_image_thumb.png?1446024845)
A
![](https://s3.amazonaws.com/brainscape-prod/system/cm/165/740/403/a_image_thumb.png?1446024884)