Dr. Blahbah has implemented a system with an 8-bit random canary that is used to de tect and prevent stack-based buffer overflow attacks. Describe an effective attack against Dr. Blahbah's system and analyze its likelihood of success

What will be an ideal response?

An 8-bit canary only provides 256 possible canary values, so an attacker can
try all possibilities in a fairly short amount of time. As soon as one of them has succeeded,
he has compromised the system, and each one has a pretty good, one out of 256 chance, of
succeeding.

Computer Science & Information Technology

You might also like to view...

A AND B AND C

For each of the Boolean functions given below, state whether the problem is linearly separable.

Computer Science & Information Technology

6, 8, 4, 3, and 1 are inserted into a data structure in that order. An item is deleted using only a basic data structure operation. If the deleted item is a 1, the data structure cannot be a

a. vector b. priority queue c. queue d. STL set e. stack

Computer Science & Information Technology