1/8
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Buffer Overflow
A security vulnerability in software where more data is input into a buffer than it can handle, potentially overwriting other information and allowing attackers to manipulate data or execute malicious code.
Von-Neumann architecture
A computer system design where data and programs share the same memory space, making it easier for attackers to exploit buffer overflow vulnerabilities.
Stack
Memory used for organizing local variables, function calls, and frames for different functions in a program.
Heap
Memory segment where dynamic data allocated during runtime by the user program is stored.
Stack Pointer (esp)
Points to the end of the current frame in the stack, indicating the current position for stack operations.
Frame Pointer (ebp)
Points to the start of the current frame in the stack, helping keep track of variables and function calls.
Instruction Pointer (eip)
Points to the next instruction to be executed in the program, crucial for maintaining the program flow.
Denial of Service
A common impact of buffer overflows where the system becomes unavailable to legitimate users due to the attack.