A program is written to compute the sum of the integers from 1 to 10. The programmer, well trained in reusability and maintainability, writes the program so that it computes the sum of the numbers from k to n. However, a team of security specialists scrutinizes the code. The team certifies that this program properly sets k to 1 and n to 10; therefore, the program is certified as being properly restricted in that it always operates on precisely the range 1 to 10. List different ways that this program can be sabotaged so that during execution it computes a different sum, for example, 3 to 20.

What will be an ideal response?


Someone changes the source code before its compilation. (b) Someone patches (i.e., modifies) the binary object code while it is stored on disk before execution. (c) During execution, an outside process patches the object code.

Computer Science & Information Technology

You might also like to view...

A computer can have a permanently assigned dynamic IP address.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

can be written as:

Java supports type inferencing with the <> notation in statements that declare and create generic type variables and objects. For example, the following line: List list = new ArrayList(); a. List<> list = new ArrayList<>(); b. List<> list = new ArrayList(); c. List list = new ArrayList<>(); d. List list = new ArrayList();

Computer Science & Information Technology

Which class of IP addresses are used for multicast communications, in which a single address may be associated with more than one network host machine?

A. Class A B. Class B C. Class C D. Class D

Computer Science & Information Technology

What protocol is used to translate MAC layer addresses into numeric IP addresses?

A. ARP B. RARP C. RIP D. IP

Computer Science & Information Technology