Course: SECURE CODING (MTCSPC2002)
UNIT I: Introduction to Secure Coding
- Explain the key security
concepts and the principles of security architecture.
- Discuss common string
manipulation errors and string vulnerabilities in C and C++.
- Describe the process memory
organization and how stack smashing occurs.
- Explain code injection and
arc injection with examples.
- Analyze notable
vulnerabilities in C and C++ programming.
- What is pointer subterfuge?
Discuss the types of pointer subterfuge and how they can be exploited.
- Describe the role of the
Global Offset Table in pointer manipulation.
- Explain the use of the at_exit() and on_exit() functions in secure coding.
- Discuss how the longjmp() function can be used in
exception handling and its security implications.
UNIT II: Dynamic Memory Management and Integer
Security
- What are common dynamic
memory management errors, and how can they be prevented?
- Describe Doug Lea's memory
allocator and its significance.
- Explain the concept of
RtlHeap and its role in memory management.
- Discuss integer security and
the types of integer error conditions.
- Explain integer conversions
and the potential vulnerabilities they introduce.
- Describe notable
vulnerabilities related to dynamic memory management.
- What are non-exceptional
integer logic errors? Provide examples.
- Analyze how integer
operations can lead to security vulnerabilities.
UNIT III: Formatted Output and File I/O
- Explain the role of variadic
functions in formatted output.
- Discuss the exploitation of
formatted output functions with examples.
- What is stack randomization,
and how does it enhance security?
- Describe the importance of
concurrency in file I/O operations.
- Explain the time of check,
time of use (TOCTOU) vulnerability and provide examples.
- How can files be used as
locks, and what are the security implications?
- Discuss file system exploits
and their impact on system security.
UNIT IV: Web Application Security
- What is SQL injection, and
how can it be mitigated?
- Describe web server–related
vulnerabilities such as XSS, XSRF, and response splitting.
- Explain web client–related
vulnerabilities with a focus on XSS.
- Discuss the use of magic
URLs and the associated security risks.
- Provide examples of common
web application security flaws and their remedies.
UNIT V: Predictable Cookies and Hidden Form Fields
- Explain the concept of
predictable cookies and how they can be exploited.
- Discuss the role of hidden
form fields in web application security.
- What are CWE references, and
how are they used in secure coding?
- Analyze the impact of
predictable cookies on web application security.
- Explain the process of
spotting patterns in code review for hidden form fields.
- Discuss testing techniques
for identifying security issues related to predictable cookies and hidden
form fields.
- Describe the redemption
steps for securing web applications against predictable cookies and hidden
form fields.
0 Comment to "SECURE CODING (MTCSPC2002) Question Bank1"
Post a Comment
Note: Only a member of this blog may post a comment.