A flaw in the protection system of many operating systems is argument passing. Often, a common shared stack is used by all nested routines for arguments as well as for the remainder of the context of each calling process.
What will be an ideal response?
a. Explain what vulnerabilities this flaw presents.
b. Explain how the flaw can be controlled. The shared stack is still to be used for passing arguments and storing context.
Computer Science & Information Technology
You might also like to view...
The ________ command is a common type of hyperlink that helps generate a link for sending e-mail
A) hyperlink B) Mailto C) Boolean D) legacy
Computer Science & Information Technology
In project management, the ________ process group is where results are produced and reported
A) monitoring and control B) executing C) planning D) initiating
Computer Science & Information Technology