Research Paper Flashcards

1
Q

Dynamic Loading accomplishes all of the following EXCEPT:

a. Enables modularity and reuse
b. Prevents escalation of privileges by blocking the copying of read-only executables to memory locations allowing read-write access
c. Reduces memory footprint by sharing code pages of libraries and executables
d. Simplifies update procedures by eliminating need to recompile executables when a library is updated

A

Correct Answer: B

In the abstract of “An Evil Copy”. This is the central issue with dynamic loading the researchers are trying to solve.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Select the best definition of a code-reuse attack as mentioned in the research paper “An Evil Copy…”:

a. An attacker analyzes open-source code to guess what the program is running. They then exploit areas of the code to inject malicious data into and use a worm to infiltrate.
b. An attacker targets low level programming languages like C/C++. They reuse older attacks in an attempt to brute-force the program into accepting the malicious payload.
c. An attacker uses a new attack vector based on copy relocations. It allows attackers to escalate their privileges by copying packages from read-only memory locations to read-write memory locations.

A

Correct Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

“An Evil Copy…” states that _________ compilation is the root cause for the copy relocation violation (CoREV).

a. dynamic
b. linkage
c. separate
d. static

A

Correct answer: C

p. 5 of “An Evil Copy…”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

“An Evil Copy…” proposes three mitigation techniques for CoREV. All of these are such techniques EXCEPT:

a. Disable the dynamic loader
b. Detect through simple checker
c. Enable a compiler switch
d. Changing the toolchain

A

Correct Answer: A

p. 7 of “An Evil Copy…” lists the other three techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Recompiling software is one such mitigation technique for CoREV. Ge, Payer, & Jaeger (2017) specifically recommended adding a certain compiler flag. This flag is:

a. -fPIC
b. -fPID
c. -fPIE
d. -*p

A

Correct Answer: A

p. 8 in “An Evil Copy”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Does CoREV affect Microsoft, MacOS, or both?

a. Affects Mac OS
b. CoREV affects neither Microsoft or Mac OSes
c. Affects Microsoft OS
d. CoREV affects both Microsoft and Mac OSes

A

Correct Answer: B

p. 13 of “An Evil Copy…”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly