a. A buffer overflow attack can be enabled by: (1) incrementing an integer counter too many times (2) using gets() to read a line of input into a stack-based buffer (3) using a poor random number generator (4) assigning a negative short value to a long variable b. What is a gadget? (1) a defense against code-injection attacks (2) a system call that does something useful (3) a short sequence of existing machine code that ends with ret (4) a lousy random number generator c. Which of these is not a countermeasure against buffer overflows? Using a garbage-collected language like Java Making the stack non-executable (1) (2) (3) Always limiting the length of input from an untrusted source (4) Address space layout randomization
a. A buffer overflow attack can be enabled by: (1) incrementing an integer counter too many times (2) using gets() to read a line of input into a stack-based buffer (3) using a poor random number generator (4) assigning a negative short value to a long variable b. What is a gadget? (1) a defense against code-injection attacks (2) a system call that does something useful (3) a short sequence of existing machine code that ends with ret (4) a lousy random number generator c. Which of these is not a countermeasure against buffer overflows? Using a garbage-collected language like Java Making the stack non-executable (1) (2) (3) Always limiting the length of input from an untrusted source (4) Address space layout randomization
Related questions
Question
this question has 4 parts
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 4 steps