Download presentation
Presentation is loading. Please wait.
Published byAlexander Gregory Modified over 9 years ago
2
Dynamic Link Library Replace a dll with attack code
3
File integrity manager Hash all system file and store these hashes in a secure database. Hashes need to be recomputed when system is updated. Check the hash of all system files. If any do not match, you have a trojan horse.
4
Werner & Frank, “What Dick and Jane Don’t Know About Integers”, Information Systems Education Journal, 2008.
5
unsigned char connections = 0; //insert network code // connections++; if(connections < 5) grant_acccess(); else deny_access();
6
Time of Check/Time of Use Problem (TOCTOU) Pointer to my file Check it Pointer to password file
7
if(access(argv[1], R_OK) != 0) { printf(“Cannot access file.\n”); exit(1); } file = open(argv[1], O_RDONLY);
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.