A program is written to compute the sum of the integers from 1 to 10. The programmer, well trained in reusability and maintainability, writes the program so that it computes the sum of the numbers from k to n. However, a team of security specialists scrutinizes the code. The team certifies that this program properly sets k to 1 and n to 10; therefore, the program is certified as being properly
restricted in that it always operates on precisely the range 1 to 10. List different ways that this program can be sabotaged so that during execution it computes a different sum, for example, 3 to 20.
What will be an ideal response?
(a)
Someone
changes
the
source
code
before
its
compilation.
(b)
Someone
patches
(i.e.,
modifies)
the
binary
object
code
while
it
is
stored
on
disk
before
execution.
(c)
During
execution,
an
outside
process
patches
the
object
code.
You might also like to view...
Saving a picture as a ________ image results in a good quality compressed picture with a smaller file size than other picture file types
A) BMP B) PNG C) JPEG D) GIF
Answer the following statements true (T) or false (F)
1. The following function does not throw any unhandled exceptions void f1( ) throw ( ); 2. Functions that might throw an exception must have a throw list. 3. Functions may potentially throw at most one exception. 4. If a function throws an exception, it must be caught inside that function. 5. It is legal to have a catch block with no parameter.