Compiled Apps, Buffer Overflows, OS Security Models Flashcards

(18 cards)

1
Q

Web Apps vs Compiled Software

A

In the real world there is always a mix.
* Platform: web apps run on any browser/device, compiled is built for specific OS/architecture
* Updates: web apps - server-side, instant, compiled - user download/install
* Performance: web network-dependent cross-device, compiled - faster, offline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of languages

A
  • Directed to microprocessor
  • Compiled - C/C++
  • Interpreted - Python
  • Mix - Java
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is compilation?

A

Process of generating executable code from source code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does compilation work?

A

1) Preprocessor handles macros in source code
2) Compiler translates source code into low-level code (assembly code)
3) Assembler translates to machine code
4) Linker combines files into one executable
5) Runs directly on CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Buffer Overflow

A

Vulnerability where a program writes data to a buffer that exceeds its allocated memory, overwriting adjacent memory locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dangers of Buffer Overflow Vulnerability

A

Allows RCE can be exploited by attackers to execute malicious code, steal data, or gain unauthorized system access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is memory managed?

A

OS allocates memory to running programs and keeps track of which memory is in use or free using memory allocation to avoid conflicts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does CPU run code?

A

Repeatedly executes a cycle of fetching an instruction from memory, decoding it, and then executing it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Jailbreaking

A

Process of removing software restrictions on iOS devices, granting users “root” access to the OS for full control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rooting in mobile phones

A

Gain of superuser (administrator-level) privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Unified Extensible Firmware Interface (UEFI)

A

Modern firmware replacing BIOS; boots OS faster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Secure Windows Boot

A

UEFI feature. Checks digital signatures to block unsigned/malicious boot software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DRM

A

DRM (Digital Rights Management) controls access to copyrighted digital content through encryption and licensing. It protects creators from piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Threat Model Underlying AOSP

A

Network communication is untrusted
Untrusted content is executed/proceesed on/by device
Advsaries can get physical access to android device
Many stakeholders in ecosystem can act as supply chain attack vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How AOS protects itself in running apps phase?

A

Apps run in isolation with no direct system access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How AOS protects itself in booting device phase?

A

Checks OS integrity and uses keys in hardware

17
Q

AOS Security Hardware: TPMs

A

Trusted Platform Module. A hardware device that generates and stores cryptographic keys and verifies system integrity. When opened it is destroyed.

18
Q

Microprocessors version of TPM

A

Trusted Execution Environments (TEE)