Buffer Overflow Defenses

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/10

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

11 Terms

1
New cards

High

()-level languages are not vulnerable to buffer overflow attacks because compiler enforces range checks and permissible operations on variables

2
New cards

libraries

high-level languages’ use of some () still allows them to still be somewhat vulnerable to buffer overflow attacks

there are still some () that provide extra securities against buffer overflows

3
New cards

stackguard

adds function entry and exit code to check stack for signs of corruption

4
New cards

address space randomization

the method of manipulating the stack, heap, global data etc. to avoid buffer overflow jumps or other injections from being submitted
the memory ,moving is done randomly

5
New cards

guard pages

a section of memory that is always kept empty

6
New cards

taint analysis

keeping track of the tags derived from user input

7
New cards

taint seed

specific input that is meant to be monitored as program runs

8
New cards

integer underflow

occurs at run-time when the result of an integer expression is smaller than its minimum value, thus “wrapping” to the maximum integer for the type

9
New cards

return to system call

a return call on the stack gets replaced with another systm call

10
New cards

Global Data Overflow

Same thing as stack or heap overflow but used in the global memory
you can defend against this by moving function pointers, adding guard pages, and having non-executable or random global data region

11
New cards

shellcode

a small piece of code used as the payload in the exploitation of a software vulnerability