Security | In Computing Pfleeger Solutions Manual
| Subject | ReportX | Printer | BackupTape | |-------------|-------------|-------------|-------------| | Alice | read, write | – | – | | Bob | read | – | – | | FileServer | – | write | read | Problem 3 A C program has a buffer char buf[64] and a vulnerable gets(buf) . The return address is stored at $ebp + 4 . If buf starts at $ebp - 80 , how many bytes of junk are needed before overwriting the return address?
Resulting query: SELECT * FROM users WHERE user = 'admin' -- ' AND pass = 'anything' Security In Computing Pfleeger Solutions Manual
Username: admin' -- Password: anything
Show an injection that logs in as admin without knowing the password. | Subject | ReportX | Printer | BackupTape
Biba strict integrity: no read down, no write up (opposite of Bell–LaPadula for confidentiality). a) Medium read High: Read up → Allowed (read up is fine in Biba). b) Medium modify Low: Write down → Allowed (write down is fine in Biba). Topic 8: SQL Injection Problem 8 A login query is: "SELECT * FROM users WHERE user = '" + username + "' AND pass = '" + password + "'" Resulting query: SELECT * FROM users WHERE user
Distance from buf to return address: From $ebp - 80 to $ebp = 80 bytes (buffer + saved ebp) Then +4 bytes to return address = 84 bytes total. Answer: 84 bytes of junk before new return address. Topic 4: Symmetric vs Asymmetric Encryption Problem 4 You need to securely send a large file (1 GB) to a colleague over the internet. Compare using AES (symmetric) vs RSA (asymmetric) for encrypting the file itself. Which is practical and why?