Presentation is loading. Please wait.

Presentation is loading. Please wait.

Buffer Overflow Slide Set #7 Textbook Chapter 10 Clicker Questions

Similar presentations


Presentation on theme: "Buffer Overflow Slide Set #7 Textbook Chapter 10 Clicker Questions"— Presentation transcript:

1 Buffer Overflow Slide Set #7 Textbook Chapter 10 Clicker Questions
                    Peer Instruction Questions for Intro to Computer Security by William E. Johnson, Allison Luzader, Irfan Ahmed is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

2 Prevention techniques for buffer overflow are known
Prevention techniques for buffer overflow are known. Why is buffer overflow still a concern? Prevention techniques are incredibly difficult to implement Legacy code contains buffer overflow vulnerabilities Poor programming practices None/Other/More than one of the above Correct Answer = D (both B & C are correct) Source: Computer Security Principles and Practice, Third Edition, page 241 & 265 Question Triggers: ”Identify a set" because of the option in choice D ”None of the above" because of the option in choice D “Qualitative questions” because this question is qualitative—students must examine the definition as well as the reason for continuing propagation of this vulnerability Total Count: 3 Count without none of the above: 2 Count without identify a set: 2 Count without none of the above or identify a set: 1 Complexity: Simple Presentation: Example

3 What is the significance of the Morris Worm?
Exploited a buffer overflow vulnerability in SQL server First widely used buffer overflow attack Used buffer overflow attack as its attack mechanism None/Other/More than one of the above Correct Answer = D (both B & C are correct) Source: Computer Security Principles and Practice, Third Edition, page 241 & 265 Question Triggers: ”Identify a set" because of the option in choice D ”None of the above" because of the option in choice D “Qualitative questions” because this question asks for understanding of a concept/idea Total Count: 3 Count without none of the above: 2 Count without identify a set: 2 Count without none of the above or identify a set: 1 Complexity: Simple (I considered composite, as it requires the understanding of buffer overflow as its means of attack, but I don’t know that understanding the concept of buffer overflows is essential to correctly answering this question) Presentation: Definitional

4 Which of the following describes a buffer overflow attack?
Exploiting the traffic flow mechanism in a buffer and blocking packets from reaching their destination. Flooding a buffer with server requests and overflowing the network bandwidth. Attempting to store more input in a data holding area than capacity allocates. None/Other/More than one of the above Correct Answer = C Source: Computer Security Principles and Practice, Third Edition, page 241 & 265 Question Triggers: ”Identify a set" because of the option in choice D ”None of the above" because of the option in choice D “Qualitative questions” as this asks for identification of features of a concept or idea Total Count: 3 Count without none of the above: 2 Count without identify a set: 2 Count without none of the above or identify a set: 1 Complexity: Simple Presentation: Definitional

5 Which of the following describes a potential consequence of a buffer overflow attack?
Data in memory might be overwritten unexpectedly. An attacker might inject malicious code causing this to run after overflowing the buffer. Network capacity might be reached by flooding the buffer. None/Other/More than one of the above Correct Answer = D (both A & B are correct) Source: Computer Security Principles and Practice, Third Edition, page 241 & 265 Question Triggers: ”Identify a set" because of the option in choice D ”None of the above" because of the option in choice D “Qualitative questions” as this is a question requiring understanding of the concept of buffer overflow as well as potential consequences Total Count: 3 Count without none of the above: 2 Count without identify a set: 2 Count without none of the above or identify a set: 1 Complexity: Simple Presentation: Feature Identification

6 Which of the following explains why modern, high-level languages are not susceptible to buffer overflow attacks? They allow direct access to memory. They are not strongly typed. They have a strong notion of valid operations. Large legacy code is written in high-level languages and thus is safe (since it’s been used for years). None/Other/More than one of the above Correct Answer = C Source: Computer Security Principles and Practice, Third Edition, page 241 & 265 Question Triggers: ”Identify a set" because of the option in choice E ”None of the above" because of the option in choice E “Qualitative questions” because this asks about concepts; not about numbers “Analysis and reasoning” as students must identify the features that prevent susceptibility “Trolling for misconceptions”; while not the best example, I think is an important feature of choice D to see if students believe high-level language code is inherently safe (it’s not, and vulns such as race conditions are certainly still very viable even when buffer overflows may not be) Total Count: 5 Count without none of the above: 4 Count without identify a set: 4 Count without none of the above or identify a set: 3 Complexity: Composite; requires understanding of basics of buffer overflows as well as the protections more frequently available in higher level languages Presentation: Feature Identification

7 Which of the following explains why C and other related languages are susceptible to buffer overflow attacks? They allow direct access to memory. They are strongly typed and have a strong notion of valid operations. They include several control structures which cause buffer overflow vulnerabilities. None/Other/More than one of the above Correct Answer = A Source: Computer Security Principles and Practice, Third Edition, page 241 & 265 Question Triggers: ”Identify a set" because of the option in choice D ”None of the above" because of the option in choice D “Qualitative questions” because this asks about concepts; not about numbers “Analysis and reasoning” as students must identify the features that indicate susceptibility Total Count: 4 Count without none of the above: 3 Count without identify a set: 3 Count without none of the above or identify a set: 2 Complexity: Composite; requires understanding of basics of buffer overflows as well as the reasons for susceptibility in lower level languages such as C Presentation: Feature Identification


Download ppt "Buffer Overflow Slide Set #7 Textbook Chapter 10 Clicker Questions"

Similar presentations


Ads by Google