CSE127, Computer Security - Control Flow Vulnerabilities and Buffer Overflows

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/9

flashcard set

Earn XP

Description and Tags

These flashcards cover key terms and concepts from the CSE127 lecture on computer security, specifically focusing on control flow vulnerabilities and buffer overflows.

Last updated 4:08 AM on 2/12/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

10 Terms

1
New cards

Control Flow Integrity

A security property that ensures the control flow of a program is not deviated from its intended path.

2
New cards

Buffer Overflow

An anomaly that occurs when a program writes data beyond the boundary of a buffer, potentially leading to arbitrary code execution.

3
New cards

Weird Machine

A term for unintended functionality that arises when software reacts to unexpected input, often exploited by attackers.

4
New cards

Stack Pointer (ESP)

A special CPU register that points to the top of the stack, used during function calls and local variable storage.

5
New cards

Return Address

The address in memory where the execution of a program should resume after a function call is completed.

6
New cards

Unsafe String Functions

Functions like strcpy() and gets() in C that do not perform bounds checking and can lead to buffer overflows.

7
New cards

Shellcode

A small piece of code used as the payload in the exploitation of a software vulnerability, typically to spawn a shell.

8
New cards

Arbitrary Code Execution

A vulnerability that allows an attacker to execute arbitrary commands on a host machine.

9
New cards

Function Call Stack

A data structure that tracks active function calls in a program, managing their local variables and return addresses.

10
New cards

Control Data

Information in a program that directs the flow of control and can become a target for attacks that exploit buffer overflows.