CTCH 685 9040: Unit 6 Assignment: Space Layout Randomization (ASLR) in C Programs

CTCH 685 9040: Unit 6 Assignment: Space Layout Randomization (ASLR) in C Programs

Unit 6 Assignment: Space Layout Randomization (ASLR) in C Programs

Exercise 1: Engineer software components that not only fulfill their intended functions but also maintain a high standard of security integrity.

  1. Complete the Space Layout Randomization (ASLR) in C Programs hands-on exercises.
  2. What are the primary considerations in ensuring the security of software components while maintaining their functionality in a biomedical application like MedPeople’s?
    1. Focus on general software security practices, including secure coding guidelines and the integration of ASLR.
  3. What specific steps would you take to incorporate ASLR into the MedPeople web application to enhance its resilience against memory-based attacks?

Exercise 2: Simulate real-world exploitation scenarios to better understand and anticipate attacker strategies and behaviors.

  1. How would exploiting a stack-based buffer overflow in a medical application differ from exploiting it in a standard web application, and what additional precautions should be considered?
    1. Use examples from the hands-on exercises on stack-based buffer overflows and additional considerations for medical applications.
  2. Analyze how an attacker could exploit the ASLR mechanism in the MedPeople application. What strategies might they use, and what would be the impact?
  3. Describe the process of simulating a stack-based buffer overflow attack using the hands-on exercises. What tools and techniques did you use?
  4. How would you document and report your findings from a live exploitation exercise to ensure that the development team at MedPeople can effectively remediate identified vulnerabilities?
  5. Explain the best practices for documentation and reporting based on the results from the hands-on exercises.

Exercise 3: Critique the use of different programming techniques and library integrations in the context of security vulnerability prevention.

  1. Compare and contrast the use of static and dynamic code analysis tools in identifying vulnerabilities in the MedPeople web application. Which approach would be more effective and why?
  2. How do third-party libraries and frameworks contribute to the security or vulnerability of the MedPeople web application? Provide examples from the resources.
    1. Discuss using general best practices and examples related to library security.
  3. What criteria would you use to evaluate the security of a new library before integrating it into MedPeople’s web application?

Exercise 4: Execute defensive measures in software programming to counteract the vulnerabilities exposed during exploitation exercises.

  1. Develop a secure coding guideline tailored for the development team at MedPeople Corporation, incorporating specific defenses against buffer overflows and session hijacking.
  2. Use secure coding practices and insights from the hands-on exercises on buffer overflows.
  3. How would these measures specifically address the vulnerabilities exposed during the live exploitation exercises, considering the sensitive nature of the patient data handled by the web application?
    1. Detail how the measures would mitigate specific vulnerabilities identified during the exercises.
  4. Describe the process of implementing stack canaries and ASLR in the MedPeople web application. What challenges might you encounter, and how would you address them?
  5. Use the hands-on exercises and resources on ASLR and stack canaries.
  6. How would you use static code analysis to detect potential vulnerabilities in MedPeople’s application code? Provide a step-by-step approach based on the resources provided.

Tutorial for Space Layout Randomization (ASLR) in C Programs

Space Layout Randomization (ASLR) in C Programs

$170.00

Posted

in

by