Security Engineering Flashcards
Takes place when too much data is accepted as input to a specific process.
Buffer Overflow
A countermeasure for buffer overflow.
Bounds Checking
The term for when an app does not release the memory it is using so that it is available to other apps.
Memory Leak
Name two counter measures for memory leak.
Garbage Collectors
Better code
When trying to access memory, CPU uses ____________ addresses. Applications use ______ addresses.
Physical
Logical
The ___________ acts like NAT for physical and logical memory addresses thereby providing security and efficiency.
Memory Manager
What is ASLR?
Address Space Layout Randomization. Introduced in Windows Vista (originally on OpenBSD).
Helps protect stuff in memory by making it harder to figure out where to attack it.
What is DEP?
Data Execution Prevention. Marks certain memory locations as “off-limits.”
What are four methods of process isolation?
Encapsulation of objects (provides data hiding, talk to the API !!)
Time multiplexing of shared resources (OS coordinates different requests from different processes)
Naming distinctions (PIDs)
Virtual memory mapping
A virtual machine is commonly referred to as a _______ that is executed in the ________ environment. The VMs communicate with a __________ within the host environment, which is responsible for managing system resources.
Guest
Host
Hypervisor
What is a maintenance hook?
A backdoor used by developers. Should be removed b4 release.
This type of attack takes advantage of the dependency on the timing of events that take place in a multitasking operating system. The attacker jumps in between two tasks and modifies something to control results.
Time-of-Check/Time-of-Use (TOC/TOU)
This type of attack makes processes execute out of sequence to control results.
Race Condition
What is a countermeasure for race condition attacks?
Atomicise processes
What is a countermeasure for Time-of-Check/Time-of-Use attacks?
Software locks on files.
Harder to put software locks on database components.