Computer security software: Difference between revisions

Content deleted Content added
Tarball: Added modern attack perspective for how a Tarball attack might be executed
Tarball: Added simsense and real world interaction example
Line 348:
 
From a modern attack perspective, a technique involving writing large amounts of junk code (or specifically designed "junk" code) to locations within the stack would be similar. The specific program that crashes might not be dependable, yet numerous programs might crash because of memory misalignments, unsuccessful read/writes, or fortuitously hurtful code.<ref>{{cite web |last1=Munroe |first1=Randall |title=Exploits of a Mom (Little Boby Drop Tables) |url=https://xkcd.com/327/ |website=XKCD |access-date=30 May 2021}}</ref>
 
A large simsense example would be using an exploit within the computer control of automobile steering or engines to simultaneously cause disruptions on numerous highways. The individual failures of individual automobiles might be difficult to predict, yet the combined effect would be widespread disruption and resource supply failures throughout the highway system.
 
====Track====