Dr. Blahbah has implemented a system with an 8-bit random canary that is used to de tect and prevent stack-based buffer overflow attacks. Describe an effective attack against Dr. Blahbah's system and analyze its likelihood of success

What will be an ideal response?


An 8-bit canary only provides 256 possible canary values, so an attacker can
try all possibilities in a fairly short amount of time. As soon as one of them has succeeded,
he has compromised the system, and each one has a pretty good, one out of 256 chance, of
succeeding.

Computer Science & Information Technology

You might also like to view...

The ________ statement causes a loop to terminate early.

A) stop B) break C) quit D) terminate E) continue

Computer Science & Information Technology

Program instructions and data must be placed in the computer's ____________________ to allow the computer to carry out the program instructions.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which IE tab enables you to open a new window when a new tab is clicked?

A) Connections B) Programs C) General D) Content

Computer Science & Information Technology

The default view in Word, as shown in the accompanying figure, is ____ view.

A. Print Layout B. Navigation C. Web D. Options

Computer Science & Information Technology