75、Online attacks exploit the fact that sensitive data or encryption keys may be present in the system memory in plaintext when an encrypted volume is mounted.Although super user privileges may be required for launching such attacks, we choose not to trust the administrator account.A general key scavenging attack attempts to intelligently run through the system memory ( ) trying to locate and read encryption keys.Any system that requires the communication of key material between kernel-space and user-space components is vulnerable to a general user-space attack, wherein the attacker tries to capture the key when it is present in the address space of an exploitable user-space process.Daemon masquerading is another online attack on schemes that employ a trusted user-space process for key management.An attacker can replace the trusted daemon with a malicious program or launch a man-in-the middle attack on the kernel-space and user-space channel to gain access to encryption keys.In the page cache attack, an attacker may insert and load a malicious kernel module from the user-space at run-time to traverse the page cache and access file contents.Attacks that require super user privileges may be classified.as hard or easy depending on the level of sophistication and effort required to execute them.Although accessing or modifying specific kernel-space data structures of a running system is difficult even for the administrator, exploiting user space vulnerabilities is clearly easy.In a typical compromise, an attacker may gain super user privileges for a short duration and trivially undertake the above attacks.A distinction between the kernel and user-space from a security perspective is becoming crucial as temporary root attacks become common.(4)、In the page cache attack, how to insert and load a malicious kernel module?
答案解析
相关题目
232、decide on是决定
231、I wouldn't recommend reading in this light; it may affect your eyes
230、Don't give anyone online your real last (), phone number, or your home address
229、Most of the problems () on the major online services
228、She and I would never () openly exchanged such words of affection
227、If a computer message came addressed to”Dad”, for (), I'd feel forgotten and neglected.
226、To her surprise.she found () the letter came undated
225、The medicine needs to be taken () a daily basis
224、over the years
223、My husband and I were together for six years, and with him I watched his young children becomeyoung teenagers.
