1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Black_prince [1.1K]
3 years ago
3

The least-privilege principle can be used to effectively defend against the race condition attacks discussed in this chapter. Ca

n we use the same principle to defeat buffer-overflow attacks? Why or why not? Namely, before executing the vulnerable function, we disable the root privilege; after the vulnerable function returns, we enable the privilege back.
Computers and Technology
1 answer:
Elena L [17]3 years ago
5 0

Answer and Explanation:

I felt that we cannot actually overcome buffer-overflow attacks because it will really reduced the effect of the buffer-overflow and If we are to apply the least-privilege principle, that actually means that we do not have the root privilege when executing vulnerable function,which will make us not to get the root shell when attacking successfully and may lead to getting a normal shell meaning what we can attack will be limited.

Even though we lose the privilege when executing the vulnerable function, and thus cannot get the root privilege when winning the attack, it can still do harm to the victim. Therefore when we write a bad file which consists of a extremely large quantity of meaningless and un- useful codes, into a buffer, it may make the stack full of meaningless and less important codes, leading to overwriting some area where important data is store. Although the buffer-overflow still succeeds, but we do not need root privilege when finishing the above steps which is why even if we use the principle, we still cannot defeat all conditions of buffer-overflow attacks.

You might be interested in
Provide the subnet, broadcast address and the valid host ranges for each of the
avanturin [10]

Answer:

You should now be able to give IP addresses to 254 hosts. This works fine if all 150 computers are on a single network. However, your 150 computers are on three separate physical networks. Instead of requesting more address blocks for each network, you divide your network into subnets that enable you to use one block of addresses on multiple physical networks

Explanation:

3 0
3 years ago
PLEASE HELP ME ASAP!!! Looking at the misty rain and fog (pictured above) Explain at least two defensive driving techniques you
JulsSmile [24]
1.Slow down 2. Break earlier
7 0
3 years ago
If you got band from a local library, what would be the reason for it besides shouting and talking? You're answer has to fit you
VLD [36.1K]

Answer:

I would get a band from the library because I check out ten books and returned them in a week. I also would just be in the library all the time and they would get frustrated. That or I would spend hours talking to a librarian about my favorite books and they would get fed up with me.

4 0
3 years ago
Read 2 more answers
What are three good things and three bad things about the metal pewter
Setler79 [48]
Good things:
It is a solid material,NOT plated which makes it easily engravable.
does not tarnish or
discolor easily

Bad things:
It is not a high quality metal
It will melt at low temperatures,so do not get it around extreme heat.
It can damage easy if exposed to acids like lemon juice or vinager


4 0
4 years ago
What is cloud based LinkedIn Automation?
Zielflug [23.3K]

Answer:

The cloud-based LinkedIn automation tool makes life easier for you by automating functions like sending connection requests, liking and commenting on posts, sending customized messages, and much more.

6 0
3 years ago
Read 2 more answers
Other questions:
  • 1. What should you do if your computer is shared by your entire family and you install a plugin that saves user names and passwo
    5·2 answers
  • Binary data is written in hexadecimal. For example, when creating a graphic for a website, colors are represented by six hexadec
    12·1 answer
  • Write a program (C++) that reads a number between 1,000 and999,999 from the user where the user enters a comma in the input.Then
    13·1 answer
  • Which of the following are best practices that should be done in Photoshop before placing images in InDesign?
    11·1 answer
  • What makes Darth Vader's sound so sinister, menacing and evil?
    6·2 answers
  • A user brings a technician a mobile device that has no sound. What should a technician check for first?
    5·1 answer
  • How does inertia affect a person who is not wearing a seatbelt during a collision
    8·1 answer
  • Which of the following is the last step in creating a budget?
    13·1 answer
  • I don't want my large video files using up all my hard drive space . Can I archive my videos in on DVDs or Blu Rays?
    8·1 answer
  • If the cpu is fast but the bus speed is slow, that condition is called?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!