IST 543 Foundations of Software Security Assignment

Assignment Help Software Engineering
Reference no: EM132640631

IST 543 Foundations of Software Security, Penn State University

Compile exercise.c with the following command
gcc -ggdb -m32 -fno-stack-protector -fcf-protection=none exercise.c

If you are using some latest gcc versions, you can take out the option -fcf-protection=none
if it is not available.

Answer the following questions:

(1) How many bytes does the string "john" occupy in memory? Explain.

(2) Where is "john" stored (memory address)?

(3) Where is the variable "name" stored (memory address)?

(4) What are the memory addresses of "main" (code), foo, and bar?

(5) Draw the stack layout when bar() is called first time.

Include everything in memory. See the recording and transcript of this week's class

(6) What will happen if the loop termination condition is changed to "i<1024"?*/

#include <stdio.h>

void foo();
void bar();

void main()
{
char *name = "john";
printf("hello %s!", name);
foo();
}

void foo()
{
int a=1000000;
while (a>0)
bar();
}

void bar()
{
char buf[16];
int i;

/* Question (4) */

for (i=0; i<16; i++) {
buf[i] = 'a';
}
}

Reference no: EM132640631

Questions Cloud

How do explain accounting requirement for propose investment : How do explain the accounting requirements for the proposed investment. In particular you should explain how the profit of Queen Ltd would be recognised
Find how would define fixed and variable product costs : Find How would define fixed and variable product costs? How are costs used in determining the contribution margin of different products manufactured and sold?
Develop understanding of cultural role of the dramatic arts : Plays are meant to be performed, rather than read. The purpose of dramatic arts often extends far beyond the words written on a page; staging, lighting.
How do compute the first production department cost : How do Compute the first production department's cost of ending work in process inventory for materials, conversion, and in total for May.
IST 543 Foundations of Software Security Assignment : IST 543 Foundations of Software Security Assignment Help and Solution, Penn State University - Assessment Writing Service - How many bytes does the string
Despite integration of athletes of all genders : Despite the integration of athletes of all genders and races into sport, there are still challenges. With this in mind, and based on your sports interests
Summarize the key points of strategic family therapy : Although structural therapy and strategic therapy are both used in family therapy, these therapeutic approaches have many differences in theory and application.
Find overall research experience from individual assignment : Reflections on your overall research experience from the individual assignment (activity based costing system) What was enjoyable, what was difficult.
Find what insights did gain and what had learnt : Reflections on what you learned from the individual assignment, including the relevance of Active based costing system to businesses.

Reviews

Write a Review

Software Engineering Questions & Answers

  Part 1discuss the change in qantas airline due to alliance

part 1discuss the change in qantas airline due to alliance with emirates with the use of action research model of

  Identify each path and its total duration

Identify each path and its total duration and Identify the critical path and explain its implications for this project

  Create pseudocode to compute produce sale

Suppose that all products are priced per pound. As soon as program starts, it should prompt for and get the prices of those products.

  Change the platform of a software product

What are the questions you have to ask when you are planning to change the platform of a software product?

  Explain deployment of a product are the first steps

The design, development, and deployment of a product are the first steps toward a finished product ready for distribution in the marketplace. The next step is the evaluation of the user experience in order to gather data on the usability of the pr..

  Inventory management

Just-in-time(JIT) software is unable to foresee delivery problems resulting from bad weather, labor strikes, etc. Assess how a company using JIT inventory management software should mitigate delivery problems

  Web authoring application

Compare the drawbacks and benefits of using a Web authoring application, an HTML editor and a text editor for developing websites.

  Aspect of computing has changed dramatically

McCall's quality factors were developed during the 1970s. Almost every aspect of computing has changed dramatically since the time that they were developed

  Finding cause of the bug

The following LMC program is supposed to input two numbers, compare them, and output the higher of the two numbers.

  Sketch the eer diagram for unique number and single location

A department controls number of projects, each of which has unique name, unique number, and a single location. Sketch the EER Diagram for this situation.

  What is structure and design methodology

What is structure and design methodology

  Answer the following questions using apa style and citing

answer the following questions using apa style and citing at least one credible source per answer with in-text and

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd